Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Wk731bq71c.exe

Overview

General Information

Sample name:Wk731bq71c.exe
renamed because original name is a hash value
Original sample name:48773abdad4ef3e8339d4ed2aa02f9d41611e02aefd9e93b0833a2ab99a1619f.exe
Analysis ID:1588924
MD5:78c37a72c91559ed73b7cbec99534bfc
SHA1:7813d8411e63c5599cd3c85ed306e2e04562c079
SHA256:48773abdad4ef3e8339d4ed2aa02f9d41611e02aefd9e93b0833a2ab99a1619f
Tags:exeRemcosRATuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Delayed program exit found
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • Wk731bq71c.exe (PID: 5588 cmdline: "C:\Users\user\Desktop\Wk731bq71c.exe" MD5: 78C37A72C91559ED73B7CBEC99534BFC)
    • WerFault.exe (PID: 1088 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 940 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 3192 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 964 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 1272 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 952 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7156 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1096 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 4852 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1124 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5596 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 952 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2284 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1112 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • yavascript.exe (PID: 380 cmdline: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" MD5: 78C37A72C91559ED73B7CBEC99534BFC)
      • WerFault.exe (PID: 6524 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 636 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 6428 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 676 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 5844 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 708 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 7300 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 732 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 7388 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 748 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 7464 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 796 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 7536 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 792 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 1020 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 916 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • yavascript.exe (PID: 1352 cmdline: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" MD5: 78C37A72C91559ED73B7CBEC99534BFC)
    • WerFault.exe (PID: 412 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 532 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • yavascript.exe (PID: 7572 cmdline: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" MD5: 78C37A72C91559ED73B7CBEC99534BFC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["198.23.227.212:32583:1"], "Assigned name": "Yavakosa", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "yavascript.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-I7G983", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "xenor", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000011.00000002.4552749576.0000000000570000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.2390395586.00000000005B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000014.00000002.2401143387.00000000004CA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000027.00000002.2365077997.000000000079A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.2390598572.00000000007EE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        Click to see the 87 entries
        SourceRuleDescriptionAuthorStrings
        0.3.Wk731bq71c.exe.2200000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          0.3.Wk731bq71c.exe.2200000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0.3.Wk731bq71c.exe.2200000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              0.3.Wk731bq71c.exe.2200000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6aaf8:$a1: Remcos restarted by watchdog!
              • 0x6b070:$a3: %02i:%02i:%02i:%03i
              0.3.Wk731bq71c.exe.2200000.0.unpackREMCOS_RAT_variantsunknownunknown
              • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
              • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x64e04:$str_b2: Executing file:
              • 0x65c3c:$str_b3: GetDirectListeningPort
              • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x65780:$str_b7: \update.vbs
              • 0x64e2c:$str_b9: Downloaded file:
              • 0x64e18:$str_b10: Downloading file:
              • 0x64ebc:$str_b12: Failed to upload file:
              • 0x65c04:$str_b13: StartForward
              • 0x65c24:$str_b14: StopForward
              • 0x656d8:$str_b15: fso.DeleteFile "
              • 0x6566c:$str_b16: On Error Resume Next
              • 0x65708:$str_b17: fso.DeleteFolder "
              • 0x64eac:$str_b18: Uploaded file:
              • 0x64e6c:$str_b19: Unable to delete:
              • 0x656a0:$str_b20: while fso.FileExists("
              • 0x65349:$str_c0: [Firefox StoredLogins not found]
              Click to see the 139 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\xenor\yavascript.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Wk731bq71c.exe, ProcessId: 5588, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-I7G983

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: 1E 04 D2 DB 3F 0C FE F3 82 62 77 23 55 F6 79 B1 49 36 B8 E5 8D 32 CC 27 A6 CB 6E 6A 89 1A 19 B0 B4 53 8A 49 77 14 FC 00 27 A6 E3 34 C0 ED 34 E0 0A 9D 0A D1 26 0E C1 90 99 15 44 75 A2 34 05 C5 6E C4 62 5A AD 89 35 B2 F0 68 B4 0C E0 47 A0 30 FD 73 49 70 34 DF 76 DA 6B E1 47 5F 61 46 AA 13 DB 71 55 89 7B 9B 50 50 84 E0 , EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\xenor\yavascript.exe, ProcessId: 380, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-I7G983\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T07:17:23.273173+010020365941Malware Command and Control Activity Detected192.168.2.549704198.23.227.21232583TCP
              2025-01-11T07:17:44.603427+010020365941Malware Command and Control Activity Detected192.168.2.550739198.23.227.21232583TCP
              2025-01-11T07:17:47.207810+010020365941Malware Command and Control Activity Detected192.168.2.550756198.23.227.21232583TCP
              2025-01-11T07:17:49.833857+010020365941Malware Command and Control Activity Detected192.168.2.550773198.23.227.21232583TCP
              2025-01-11T07:17:52.410141+010020365941Malware Command and Control Activity Detected192.168.2.550791198.23.227.21232583TCP
              2025-01-11T07:17:55.010489+010020365941Malware Command and Control Activity Detected192.168.2.550811198.23.227.21232583TCP
              2025-01-11T07:17:57.647123+010020365941Malware Command and Control Activity Detected192.168.2.550831198.23.227.21232583TCP
              2025-01-11T07:18:00.282944+010020365941Malware Command and Control Activity Detected192.168.2.550854198.23.227.21232583TCP
              2025-01-11T07:18:02.882976+010020365941Malware Command and Control Activity Detected192.168.2.550870198.23.227.21232583TCP
              2025-01-11T07:18:05.489528+010020365941Malware Command and Control Activity Detected192.168.2.550886198.23.227.21232583TCP
              2025-01-11T07:18:08.068120+010020365941Malware Command and Control Activity Detected192.168.2.550902198.23.227.21232583TCP
              2025-01-11T07:18:10.799441+010020365941Malware Command and Control Activity Detected192.168.2.550918198.23.227.21232583TCP
              2025-01-11T07:18:13.396350+010020365941Malware Command and Control Activity Detected192.168.2.550939198.23.227.21232583TCP
              2025-01-11T07:18:16.003666+010020365941Malware Command and Control Activity Detected192.168.2.550955198.23.227.21232583TCP
              2025-01-11T07:18:18.598012+010020365941Malware Command and Control Activity Detected192.168.2.550973198.23.227.21232583TCP
              2025-01-11T07:18:21.174409+010020365941Malware Command and Control Activity Detected192.168.2.550989198.23.227.21232583TCP
              2025-01-11T07:18:23.776232+010020365941Malware Command and Control Activity Detected192.168.2.551003198.23.227.21232583TCP
              2025-01-11T07:18:26.398654+010020365941Malware Command and Control Activity Detected192.168.2.551022198.23.227.21232583TCP
              2025-01-11T07:18:29.021689+010020365941Malware Command and Control Activity Detected192.168.2.551027198.23.227.21232583TCP
              2025-01-11T07:18:31.618444+010020365941Malware Command and Control Activity Detected192.168.2.551028198.23.227.21232583TCP
              2025-01-11T07:18:34.458801+010020365941Malware Command and Control Activity Detected192.168.2.551029198.23.227.21232583TCP
              2025-01-11T07:18:37.055003+010020365941Malware Command and Control Activity Detected192.168.2.551030198.23.227.21232583TCP
              2025-01-11T07:18:39.644610+010020365941Malware Command and Control Activity Detected192.168.2.551031198.23.227.21232583TCP
              2025-01-11T07:18:42.242043+010020365941Malware Command and Control Activity Detected192.168.2.551032198.23.227.21232583TCP
              2025-01-11T07:18:44.831036+010020365941Malware Command and Control Activity Detected192.168.2.551034198.23.227.21232583TCP
              2025-01-11T07:18:47.431417+010020365941Malware Command and Control Activity Detected192.168.2.551035198.23.227.21232583TCP
              2025-01-11T07:18:50.036187+010020365941Malware Command and Control Activity Detected192.168.2.551036198.23.227.21232583TCP
              2025-01-11T07:18:52.636299+010020365941Malware Command and Control Activity Detected192.168.2.551037198.23.227.21232583TCP
              2025-01-11T07:18:55.260360+010020365941Malware Command and Control Activity Detected192.168.2.551038198.23.227.21232583TCP
              2025-01-11T07:18:57.864798+010020365941Malware Command and Control Activity Detected192.168.2.551039198.23.227.21232583TCP
              2025-01-11T07:19:00.442481+010020365941Malware Command and Control Activity Detected192.168.2.551040198.23.227.21232583TCP
              2025-01-11T07:19:03.040022+010020365941Malware Command and Control Activity Detected192.168.2.551041198.23.227.21232583TCP
              2025-01-11T07:19:05.648558+010020365941Malware Command and Control Activity Detected192.168.2.551042198.23.227.21232583TCP
              2025-01-11T07:19:08.191417+010020365941Malware Command and Control Activity Detected192.168.2.551043198.23.227.21232583TCP
              2025-01-11T07:19:10.722973+010020365941Malware Command and Control Activity Detected192.168.2.551044198.23.227.21232583TCP
              2025-01-11T07:19:13.208232+010020365941Malware Command and Control Activity Detected192.168.2.551045198.23.227.21232583TCP
              2025-01-11T07:19:15.660277+010020365941Malware Command and Control Activity Detected192.168.2.551046198.23.227.21232583TCP
              2025-01-11T07:19:18.100308+010020365941Malware Command and Control Activity Detected192.168.2.551047198.23.227.21232583TCP
              2025-01-11T07:19:20.507259+010020365941Malware Command and Control Activity Detected192.168.2.551048198.23.227.21232583TCP
              2025-01-11T07:19:22.879361+010020365941Malware Command and Control Activity Detected192.168.2.551049198.23.227.21232583TCP
              2025-01-11T07:19:25.242635+010020365941Malware Command and Control Activity Detected192.168.2.551050198.23.227.21232583TCP
              2025-01-11T07:19:27.587765+010020365941Malware Command and Control Activity Detected192.168.2.551051198.23.227.21232583TCP
              2025-01-11T07:19:29.880259+010020365941Malware Command and Control Activity Detected192.168.2.551052198.23.227.21232583TCP
              2025-01-11T07:19:32.164191+010020365941Malware Command and Control Activity Detected192.168.2.551053198.23.227.21232583TCP
              2025-01-11T07:19:34.447164+010020365941Malware Command and Control Activity Detected192.168.2.551054198.23.227.21232583TCP
              2025-01-11T07:19:36.729454+010020365941Malware Command and Control Activity Detected192.168.2.551055198.23.227.21232583TCP
              2025-01-11T07:19:39.112202+010020365941Malware Command and Control Activity Detected192.168.2.551056198.23.227.21232583TCP
              2025-01-11T07:19:41.316259+010020365941Malware Command and Control Activity Detected192.168.2.551057198.23.227.21232583TCP
              2025-01-11T07:19:43.488815+010020365941Malware Command and Control Activity Detected192.168.2.551058198.23.227.21232583TCP
              2025-01-11T07:19:45.730557+010020365941Malware Command and Control Activity Detected192.168.2.551059198.23.227.21232583TCP
              2025-01-11T07:19:47.884274+010020365941Malware Command and Control Activity Detected192.168.2.551060198.23.227.21232583TCP
              2025-01-11T07:19:50.008399+010020365941Malware Command and Control Activity Detected192.168.2.551061198.23.227.21232583TCP
              2025-01-11T07:19:52.098472+010020365941Malware Command and Control Activity Detected192.168.2.551062198.23.227.21232583TCP
              2025-01-11T07:19:54.180315+010020365941Malware Command and Control Activity Detected192.168.2.551063198.23.227.21232583TCP
              2025-01-11T07:19:56.239826+010020365941Malware Command and Control Activity Detected192.168.2.551064198.23.227.21232583TCP
              2025-01-11T07:19:58.309017+010020365941Malware Command and Control Activity Detected192.168.2.551065198.23.227.21232583TCP
              2025-01-11T07:20:00.899853+010020365941Malware Command and Control Activity Detected192.168.2.551066198.23.227.21232583TCP
              2025-01-11T07:20:03.233972+010020365941Malware Command and Control Activity Detected192.168.2.551067198.23.227.21232583TCP
              2025-01-11T07:20:05.633015+010020365941Malware Command and Control Activity Detected192.168.2.551068198.23.227.21232583TCP
              2025-01-11T07:20:07.634005+010020365941Malware Command and Control Activity Detected192.168.2.551069198.23.227.21232583TCP
              2025-01-11T07:20:09.618838+010020365941Malware Command and Control Activity Detected192.168.2.551070198.23.227.21232583TCP
              2025-01-11T07:20:11.663772+010020365941Malware Command and Control Activity Detected192.168.2.551071198.23.227.21232583TCP
              2025-01-11T07:20:13.867437+010020365941Malware Command and Control Activity Detected192.168.2.551072198.23.227.21232583TCP
              2025-01-11T07:20:15.836743+010020365941Malware Command and Control Activity Detected192.168.2.551073198.23.227.21232583TCP
              2025-01-11T07:20:17.788320+010020365941Malware Command and Control Activity Detected192.168.2.551074198.23.227.21232583TCP
              2025-01-11T07:20:19.937328+010020365941Malware Command and Control Activity Detected192.168.2.551075198.23.227.21232583TCP
              2025-01-11T07:20:22.322011+010020365941Malware Command and Control Activity Detected192.168.2.551076198.23.227.21232583TCP
              2025-01-11T07:20:24.224900+010020365941Malware Command and Control Activity Detected192.168.2.551077198.23.227.21232583TCP
              2025-01-11T07:20:26.149639+010020365941Malware Command and Control Activity Detected192.168.2.551078198.23.227.21232583TCP
              2025-01-11T07:20:28.134681+010020365941Malware Command and Control Activity Detected192.168.2.551079198.23.227.21232583TCP
              2025-01-11T07:20:30.088532+010020365941Malware Command and Control Activity Detected192.168.2.551080198.23.227.21232583TCP
              2025-01-11T07:20:32.054443+010020365941Malware Command and Control Activity Detected192.168.2.551081198.23.227.21232583TCP
              2025-01-11T07:20:33.990435+010020365941Malware Command and Control Activity Detected192.168.2.551082198.23.227.21232583TCP
              2025-01-11T07:20:35.884432+010020365941Malware Command and Control Activity Detected192.168.2.551083198.23.227.21232583TCP
              2025-01-11T07:20:37.756136+010020365941Malware Command and Control Activity Detected192.168.2.551084198.23.227.21232583TCP
              2025-01-11T07:20:39.847535+010020365941Malware Command and Control Activity Detected192.168.2.551085198.23.227.21232583TCP
              2025-01-11T07:20:41.739564+010020365941Malware Command and Control Activity Detected192.168.2.551086198.23.227.21232583TCP
              2025-01-11T07:20:43.633374+010020365941Malware Command and Control Activity Detected192.168.2.551087198.23.227.21232583TCP
              2025-01-11T07:20:45.458947+010020365941Malware Command and Control Activity Detected192.168.2.551088198.23.227.21232583TCP
              2025-01-11T07:20:47.352455+010020365941Malware Command and Control Activity Detected192.168.2.551089198.23.227.21232583TCP
              2025-01-11T07:20:49.242202+010020365941Malware Command and Control Activity Detected192.168.2.551090198.23.227.21232583TCP
              2025-01-11T07:20:51.290947+010020365941Malware Command and Control Activity Detected192.168.2.551091198.23.227.21232583TCP
              2025-01-11T07:20:53.254488+010020365941Malware Command and Control Activity Detected192.168.2.551092198.23.227.21232583TCP
              2025-01-11T07:20:55.160147+010020365941Malware Command and Control Activity Detected192.168.2.551093198.23.227.21232583TCP
              2025-01-11T07:20:57.074621+010020365941Malware Command and Control Activity Detected192.168.2.551094198.23.227.21232583TCP
              2025-01-11T07:20:59.415387+010020365941Malware Command and Control Activity Detected192.168.2.551095198.23.227.21232583TCP
              2025-01-11T07:21:01.383487+010020365941Malware Command and Control Activity Detected192.168.2.551096198.23.227.21232583TCP
              2025-01-11T07:21:03.303898+010020365941Malware Command and Control Activity Detected192.168.2.551097198.23.227.21232583TCP
              2025-01-11T07:21:05.232450+010020365941Malware Command and Control Activity Detected192.168.2.551098198.23.227.21232583TCP
              2025-01-11T07:21:07.148408+010020365941Malware Command and Control Activity Detected192.168.2.551099198.23.227.21232583TCP
              2025-01-11T07:21:09.530566+010020365941Malware Command and Control Activity Detected192.168.2.551100198.23.227.21232583TCP
              2025-01-11T07:21:11.425892+010020365941Malware Command and Control Activity Detected192.168.2.551101198.23.227.21232583TCP
              2025-01-11T07:21:13.344412+010020365941Malware Command and Control Activity Detected192.168.2.551102198.23.227.21232583TCP
              2025-01-11T07:21:15.084578+010020365941Malware Command and Control Activity Detected192.168.2.551103198.23.227.21232583TCP
              2025-01-11T07:21:17.046674+010020365941Malware Command and Control Activity Detected192.168.2.551104198.23.227.21232583TCP
              2025-01-11T07:21:18.927294+010020365941Malware Command and Control Activity Detected192.168.2.551105198.23.227.21232583TCP
              2025-01-11T07:21:20.934562+010020365941Malware Command and Control Activity Detected192.168.2.551106198.23.227.21232583TCP
              2025-01-11T07:21:23.152454+010020365941Malware Command and Control Activity Detected192.168.2.551107198.23.227.21232583TCP
              2025-01-11T07:21:25.378958+010020365941Malware Command and Control Activity Detected192.168.2.551108198.23.227.21232583TCP
              2025-01-11T07:21:27.338961+010020365941Malware Command and Control Activity Detected192.168.2.551109198.23.227.21232583TCP
              2025-01-11T07:21:29.259614+010020365941Malware Command and Control Activity Detected192.168.2.551110198.23.227.21232583TCP
              2025-01-11T07:21:30.958094+010020365941Malware Command and Control Activity Detected192.168.2.551111198.23.227.21232583TCP
              2025-01-11T07:21:33.696503+010020365941Malware Command and Control Activity Detected192.168.2.551112198.23.227.21232583TCP
              2025-01-11T07:21:35.590795+010020365941Malware Command and Control Activity Detected192.168.2.551113198.23.227.21232583TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Wk731bq71c.exeAvira: detected
              Source: 00000000.00000002.2390598572.00000000007EE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["198.23.227.212:32583:1"], "Assigned name": "Yavakosa", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "yavascript.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-I7G983", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "xenor", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeReversingLabs: Detection: 73%
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeVirustotal: Detection: 52%Perma Link
              Source: Wk731bq71c.exeVirustotal: Detection: 52%Perma Link
              Source: Wk731bq71c.exeReversingLabs: Detection: 73%
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000014.00000002.2401143387.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365077997.000000000079A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390598572.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4553045249.00000000007E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: Wk731bq71c.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_0043293A
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021B2BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_021B2BA1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,17_2_0043293A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00772BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,17_2_00772BA1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,20_2_0043293A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00792BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,20_2_00792BA1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,39_2_0043293A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009B2BA1 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,39_2_009B2BA1
              Source: Wk731bq71c.exeBinary or memory string: -----BEGIN PUBLIC KEY-----

              Exploits

              barindex
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTR

              Privilege Escalation

              barindex
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00406764 _wcslen,CoGetObject,0_2_00406764
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00406764 _wcslen,CoGetObject,17_2_00406764
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00406764 _wcslen,CoGetObject,20_2_00406764
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00406764 _wcslen,CoGetObject,39_2_00406764
              Source: Wk731bq71c.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\Wk731bq71c.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040B335
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0041B42F
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040B53A
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0044D5E9 FindFirstFileExA,0_2_0044D5E9
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,0_2_004089A9
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00406AC2 FindFirstFileW,FindNextFileW,0_2_00406AC2
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_00407A8C
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00418C69
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,0_2_00408DA7
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0218900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0218900E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0219B696
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0218B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0218B59C
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021CD850 FindFirstFileExA,0_2_021CD850
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02198ED0 FindFirstFileW,0_2_02198ED0
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02187CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_02187CF3
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02186D29 FindFirstFileW,FindNextFileW,0_2_02186D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,17_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0044D5E9 FindFirstFileExA,17_2_0044D5E9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,17_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00406AC2 FindFirstFileW,FindNextFileW,17_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,17_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,17_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0074900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_0074900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0074B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0074B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_0075B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0078D850 FindFirstFileExA,17_2_0078D850
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00747CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_00747CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00746D29 FindFirstFileW,FindNextFileW,17_2_00746D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00758ED0 FindFirstFileW,17_2_00758ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,20_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,20_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,20_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0044D5E9 FindFirstFileExA,20_2_0044D5E9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,20_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00406AC2 FindFirstFileW,FindNextFileW,20_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,20_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,20_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,20_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0076900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,20_2_0076900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0076B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,20_2_0076B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,20_2_0077B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007AD850 FindFirstFileExA,20_2_007AD850
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00767CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,20_2_00767CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00766D29 FindFirstFileW,FindNextFileW,20_2_00766D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00778ED0 FindFirstFileW,20_2_00778ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,39_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,39_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,39_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0044D5E9 FindFirstFileExA,39_2_0044D5E9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,39_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00406AC2 FindFirstFileW,FindNextFileW,39_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,39_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,39_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,39_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0098900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,39_2_0098900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0098B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,39_2_0098B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,39_2_0099B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009CD850 FindFirstFileExA,39_2_009CD850
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00987CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,39_2_00987CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00986D29 FindFirstFileW,FindNextFileW,39_2_00986D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00998ED0 FindFirstFileW,39_2_00998ED0
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406F06

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50739 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50756 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50773 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50791 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50811 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50854 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50870 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50831 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50902 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50918 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50886 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50955 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50973 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50989 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50939 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51003 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51030 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51032 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51036 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51041 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51040 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51039 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51027 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51043 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51042 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51031 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51035 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51044 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51045 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51037 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51029 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51052 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51050 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51060 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51065 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51059 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51062 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51028 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51066 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51064 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51053 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51068 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51075 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51074 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51038 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51085 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51051 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51057 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51022 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51069 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51088 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51061 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51092 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51076 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51081 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51054 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51056 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51087 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51070 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51086 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51058 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51103 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51063 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51082 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51049 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51047 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51109 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51091 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51090 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51083 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51089 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51096 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51102 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51078 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51113 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51099 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51111 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51097 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51095 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51073 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51110 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51098 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51072 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51093 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51080 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51105 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51048 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51112 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51071 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51100 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51108 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51084 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51101 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51106 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51094 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51107 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51055 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51034 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51046 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51077 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51067 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51104 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:51079 -> 198.23.227.212:32583
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49704 -> 198.23.227.212:32583
              Source: Malware configuration extractorIPs: 198.23.227.212
              Source: global trafficTCP traffic: 192.168.2.5:49704 -> 198.23.227.212:32583
              Source: global trafficTCP traffic: 192.168.2.5:50724 -> 1.1.1.1:53
              Source: Joe Sandbox ViewIP Address: 198.23.227.212 198.23.227.212
              Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: unknownTCP traffic detected without corresponding DNS query: 198.23.227.212
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004260F7 recv,0_2_004260F7
              Source: yavascript.exeString found in binary or memory: http://geoplugin.net/json.gp
              Source: Wk731bq71c.exe, 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Wk731bq71c.exe, 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Wk731bq71c.exe, 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, yavascript.exe, 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, yavascript.exe, 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, yavascript.exe, 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000000_2_004099E4
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,17_2_004159C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,20_2_004159C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,39_2_004159C6
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_00409B10
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTR

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000014.00000002.2401143387.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365077997.000000000079A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390598572.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4553045249.00000000007E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041BB77 SystemParametersInfoW,0_2_0041BB77
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219BDDE SystemParametersInfoW,0_2_0219BDDE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041BB77 SystemParametersInfoW,17_2_0041BB77
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075BDDE SystemParametersInfoW,17_2_0075BDDE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041BB77 SystemParametersInfoW,20_2_0041BB77
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077BDDE SystemParametersInfoW,20_2_0077BDDE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041BB77 SystemParametersInfoW,39_2_0041BB77
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099BDDE SystemParametersInfoW,39_2_0099BDDE

              System Summary

              barindex
              Source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000011.00000002.4552749576.0000000000570000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000000.00000002.2390395586.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000014.00000002.2401231808.0000000000680000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000027.00000002.2364925163.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,0_2_0041CA9E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041ACC1
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,0_2_0041ACED
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219AF28 OpenProcess,NtSuspendProcess,CloseHandle,0_2_0219AF28
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219AF54 OpenProcess,NtResumeProcess,CloseHandle,0_2_0219AF54
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,0_2_0219CD05
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,17_2_0041CA9E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,17_2_0041ACC1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,17_2_0041ACED
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,17_2_0075CD05
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075AF54 OpenProcess,NtResumeProcess,CloseHandle,17_2_0075AF54
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075AF28 OpenProcess,NtSuspendProcess,CloseHandle,17_2_0075AF28
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,20_2_0041CA9E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,20_2_0041ACC1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,20_2_0041ACED
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,20_2_0077CD05
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077AF54 OpenProcess,NtResumeProcess,CloseHandle,20_2_0077AF54
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077AF28 OpenProcess,NtSuspendProcess,CloseHandle,20_2_0077AF28
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,39_2_0041CA9E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,39_2_0041ACC1
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,39_2_0041ACED
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099CD05 NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,39_2_0099CD05
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099AF28 OpenProcess,NtSuspendProcess,CloseHandle,39_2_0099AF28
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099AF54 OpenProcess,NtResumeProcess,CloseHandle,39_2_0099AF54
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004158B9
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02195B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_02195B1C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,17_2_004158B9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00755B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,17_2_00755B1C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,20_2_004158B9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00775B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,20_2_00775B1C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,39_2_004158B9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00995B1C ExitWindowsEx,LoadLibraryA,GetProcAddress,39_2_00995B1C
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041D0710_2_0041D071
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004520D20_2_004520D2
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043D0980_2_0043D098
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004371500_2_00437150
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004361AA0_2_004361AA
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004262540_2_00426254
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004313770_2_00431377
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043651C0_2_0043651C
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041E5DF0_2_0041E5DF
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0044C7390_2_0044C739
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004367C60_2_004367C6
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004267CB0_2_004267CB
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043C9DD0_2_0043C9DD
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00432A490_2_00432A49
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00436A8D0_2_00436A8D
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043CC0C0_2_0043CC0C
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00436D480_2_00436D48
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00434D220_2_00434D22
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00426E730_2_00426E73
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00440E200_2_00440E20
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043CE3B0_2_0043CE3B
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00412F450_2_00412F45
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00452F000_2_00452F00
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00426FAD0_2_00426FAD
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021A72140_2_021A7214
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219D2D80_2_0219D2D8
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021BD2FF0_2_021BD2FF
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021D23390_2_021D2339
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021B73B70_2_021B73B7
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021C10870_2_021C1087
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021BD0A20_2_021BD0A2
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021A70DA0_2_021A70DA
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021B64110_2_021B6411
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021A64BB0_2_021A64BB
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021A6A320_2_021A6A32
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219E8460_2_0219E846
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021BCE730_2_021BCE73
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021BCC440_2_021BCC44
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021B2CB00_2_021B2CB0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041D07117_2_0041D071
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004520D217_2_004520D2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043D09817_2_0043D098
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043715017_2_00437150
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004361AA17_2_004361AA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0042625417_2_00426254
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043137717_2_00431377
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043651C17_2_0043651C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041E5DF17_2_0041E5DF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0044C73917_2_0044C739
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004367C617_2_004367C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004267CB17_2_004267CB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043C9DD17_2_0043C9DD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00432A4917_2_00432A49
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00436A8D17_2_00436A8D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043CC0C17_2_0043CC0C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00436D4817_2_00436D48
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00434D2217_2_00434D22
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00426E7317_2_00426E73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00440E2017_2_00440E20
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043CE3B17_2_0043CE3B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00412F4517_2_00412F45
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00452F0017_2_00452F00
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00426FAD17_2_00426FAD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_007670DA17_2_007670DA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0077D0A217_2_0077D0A2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0078108717_2_00781087
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0076721417_2_00767214
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0077D2FF17_2_0077D2FF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075D2D817_2_0075D2D8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0079233917_2_00792339
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_007773B717_2_007773B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0077641117_2_00776411
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_007664BB17_2_007664BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075E84617_2_0075E846
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00766A3217_2_00766A32
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0077CC4417_2_0077CC44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00772CB017_2_00772CB0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0077CE7317_2_0077CE73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041D07120_2_0041D071
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004520D220_2_004520D2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043D09820_2_0043D098
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043715020_2_00437150
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004361AA20_2_004361AA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0042625420_2_00426254
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043137720_2_00431377
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043651C20_2_0043651C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041E5DF20_2_0041E5DF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0044C73920_2_0044C739
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004367C620_2_004367C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004267CB20_2_004267CB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043C9DD20_2_0043C9DD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00432A4920_2_00432A49
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00436A8D20_2_00436A8D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043CC0C20_2_0043CC0C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00436D4820_2_00436D48
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00434D2220_2_00434D22
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00426E7320_2_00426E73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00440E2020_2_00440E20
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043CE3B20_2_0043CE3B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00412F4520_2_00412F45
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00452F0020_2_00452F00
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00426FAD20_2_00426FAD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007870DA20_2_007870DA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0079D0A220_2_0079D0A2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007A108720_2_007A1087
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0078721420_2_00787214
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0079D2FF20_2_0079D2FF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077D2D820_2_0077D2D8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007B233920_2_007B2339
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007973B720_2_007973B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0079641120_2_00796411
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007864BB20_2_007864BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077E84620_2_0077E846
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00786A3220_2_00786A32
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0079CC4420_2_0079CC44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00792CB020_2_00792CB0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0079CE7320_2_0079CE73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041D07139_2_0041D071
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004520D239_2_004520D2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043D09839_2_0043D098
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043715039_2_00437150
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004361AA39_2_004361AA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0042625439_2_00426254
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043137739_2_00431377
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043651C39_2_0043651C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041E5DF39_2_0041E5DF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0044C73939_2_0044C739
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004367C639_2_004367C6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004267CB39_2_004267CB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043C9DD39_2_0043C9DD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00432A4939_2_00432A49
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00436A8D39_2_00436A8D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043CC0C39_2_0043CC0C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00436D4839_2_00436D48
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00434D2239_2_00434D22
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00426E7339_2_00426E73
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00440E2039_2_00440E20
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043CE3B39_2_0043CE3B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00412F4539_2_00412F45
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00452F0039_2_00452F00
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00426FAD39_2_00426FAD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009C108739_2_009C1087
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009BD0A239_2_009BD0A2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009A70DA39_2_009A70DA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099D2D839_2_0099D2D8
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009BD2FF39_2_009BD2FF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009A721439_2_009A7214
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009B73B739_2_009B73B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009D233939_2_009D2339
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009A64BB39_2_009A64BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009B641139_2_009B6411
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099E84639_2_0099E846
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009A6A3239_2_009A6A32
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009B2CB039_2_009B2CB0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009BCC4439_2_009BCC44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009BCE7339_2_009BCE73
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: String function: 021B3B0C appears 41 times
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: String function: 004020E7 appears 39 times
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: String function: 021B4217 appears 46 times
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: String function: 0218234E appears 37 times
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: String function: 00401F66 appears 50 times
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: String function: 004338A5 appears 41 times
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: String function: 00433FB0 appears 55 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 0074234E appears 37 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 0043ADAE appears 45 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401D64 appears 64 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00447174 appears 54 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401F66 appears 150 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401FAA appears 63 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00403B40 appears 66 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 0076234E appears 37 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00433FB0 appears 165 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00406478 appears 33 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00774217 appears 46 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00444B14 appears 84 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00404C9E appears 48 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004026CE appears 45 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004020E7 appears 119 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004567E0 appears 39 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401E8F appears 55 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00401E52 appears 33 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00793B0C appears 41 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004040BB appears 54 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00410D8D appears 54 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 009B3B0C appears 41 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 004338A5 appears 123 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00794217 appears 46 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 009B4217 appears 46 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 0098234E appears 37 times
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: String function: 00773B0C appears 41 times
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 940
              Source: Wk731bq71c.exe, 00000000.00000000.2080131971.0000000000484000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesOdilemio> vs Wk731bq71c.exe
              Source: Wk731bq71c.exeBinary or memory string: OriginalFilenamesOdilemio> vs Wk731bq71c.exe
              Source: Wk731bq71c.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000011.00000002.4552749576.0000000000570000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000000.00000002.2390395586.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000014.00000002.2401231808.0000000000680000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000027.00000002.2364925163.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@21/67@0/1
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00416AB7
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02196D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_02196D1E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,17_2_00416AB7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00756D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,17_2_00756D1E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,20_2_00416AB7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00776D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,20_2_00776D1E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,39_2_00416AB7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00996D1E GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,39_2_00996D1E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040E219
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041A63F
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00419BC4
              Source: C:\Users\user\Desktop\Wk731bq71c.exeFile created: C:\Users\user\AppData\Roaming\xenorJump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess380
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5588
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1352
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\17bae2e2-ddd4-4a2e-8852-c762f4336783Jump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Software\0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Rmc-I7G9830_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Exe0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Exe0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Rmc-I7G9830_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: 0DG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Inj0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Inj0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: @CG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: exepath0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: @CG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: exepath0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: BG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: licence0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: `=G0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: XCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: dCG0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: Administrator0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: User0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: del0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: del0_2_0040D767
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCommand line argument: del0_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Software\17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Rmc-I7G98317_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Exe17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Exe17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Rmc-I7G98317_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: 0DG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: licence17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: `=G17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: dCG17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Administrator17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: User17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del17_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: %cy17_2_00796277
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Software\20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: (CG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Exe20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: (CG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: 0DG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: licence20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: `=G20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: dCG20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Administrator20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: User20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del20_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: %c{20_2_007B6277
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Software\39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: (CG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Exe39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: (CG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: 0DG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Inj39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: @CG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: exepath39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: BG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: licence39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: `=G39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: XCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: dCG39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: Administrator39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: User39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del39_2_0040D767
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCommand line argument: del39_2_0040D767
              Source: Wk731bq71c.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Wk731bq71c.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Wk731bq71c.exeVirustotal: Detection: 52%
              Source: Wk731bq71c.exeReversingLabs: Detection: 73%
              Source: C:\Users\user\Desktop\Wk731bq71c.exeFile read: C:\Users\user\Desktop\Wk731bq71c.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Wk731bq71c.exe "C:\Users\user\Desktop\Wk731bq71c.exe"
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 940
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 964
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 952
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1096
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1124
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 952
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1112
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 916
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 636
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 676
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 532
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 708
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 732
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 748
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 796
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 792
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" Jump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: msimg32.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: msvcr100.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: apphelp.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msimg32.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: urlmon.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iertutil.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: srvcli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: netutils.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msvcr100.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: mswsock.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msimg32.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: urlmon.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iertutil.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: srvcli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: netutils.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msvcr100.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msimg32.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: urlmon.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iertutil.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: srvcli.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: netutils.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: msvcr100.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\Desktop\Wk731bq71c.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Wk731bq71c.exeUnpacked PE file: 0.2.Wk731bq71c.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeUnpacked PE file: 17.2.yavascript.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeUnpacked PE file: 20.2.yavascript.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeUnpacked PE file: 39.2.yavascript.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCE3
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004567E0 push eax; ret 0_2_004567FE
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0045B9DD push esi; ret 0_2_0045B9E6
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00463EF3 push ds; retf 0_2_00463EEC
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00455EAF push ecx; ret 0_2_00455EC2
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00433FF6 push ecx; ret 0_2_00434009
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_005B5B6A pushfd ; ret 0_2_005B5B6B
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_005B2CF5 push es; ret 0_2_005B2D02
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021B425D push ecx; ret 0_2_021B4270
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0218724F push edx; retf 0_2_02187252
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021A409D push esi; ret 0_2_021A409F
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021D6116 push ecx; ret 0_2_021D6129
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021D6A47 push eax; ret 0_2_021D6A65
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02195EC9 push edi; ret 0_2_02195ECA
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02195C73 push esp; ret 0_2_02195C74
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004567E0 push eax; ret 17_2_004567FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0045B9DD push esi; ret 17_2_0045B9E6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00463EF3 push ds; retf 17_2_00463EEC
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00455EAF push ecx; ret 17_2_00455EC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00433FF6 push ecx; ret 17_2_00434009
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00575B6A pushfd ; ret 17_2_00575B6B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00572CF5 push es; ret 17_2_00572D02
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0076409D push esi; ret 17_2_0076409F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00796116 push ecx; ret 17_2_00796129
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0077425D push ecx; ret 17_2_00774270
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0074724F push edx; retf 17_2_00747252
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00796A47 push eax; ret 17_2_00796A65
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00755C73 push esp; ret 17_2_00755C74
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00755EC9 push edi; ret 17_2_00755ECA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004567E0 push eax; ret 20_2_004567FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0045B9DD push esi; ret 20_2_0045B9E6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00463EF3 push ds; retf 20_2_00463EEC
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00406128 ShellExecuteW,URLDownloadToFileW,0_2_00406128
              Source: C:\Users\user\Desktop\Wk731bq71c.exeFile created: C:\Users\user\AppData\Roaming\xenor\yavascript.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\Wk731bq71c.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983Jump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00419BC4
              Source: C:\Users\user\Desktop\Wk731bq71c.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983Jump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983Jump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCE3
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0040E54F Sleep,ExitProcess,0_2_0040E54F
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0218E7B6 Sleep,ExitProcess,0_2_0218E7B6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040E54F Sleep,ExitProcess,17_2_0040E54F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0074E7B6 Sleep,ExitProcess,17_2_0074E7B6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0040E54F Sleep,ExitProcess,20_2_0040E54F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0076E7B6 Sleep,ExitProcess,20_2_0076E7B6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0040E54F Sleep,ExitProcess,39_2_0040E54F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0098E7B6 Sleep,ExitProcess,39_2_0098E7B6
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_004198C2
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_02199B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,17_2_004198C2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,17_2_00759B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,20_2_004198C2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,20_2_00779B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,39_2_004198C2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,39_2_00999B29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeWindow / User API: threadDelayed 410
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeWindow / User API: threadDelayed 9521
              Source: C:\Users\user\Desktop\Wk731bq71c.exeEvaded block: after key decisiongraph_0-88597
              Source: C:\Users\user\Desktop\Wk731bq71c.exeEvaded block: after key decisiongraph_0-88570
              Source: C:\Users\user\Desktop\Wk731bq71c.exeAPI coverage: 3.5 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI coverage: 5.6 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI coverage: 3.2 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI coverage: 3.1 %
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 4852Thread sleep count: 410 > 30
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 4852Thread sleep time: -1230000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 4852Thread sleep count: 9521 > 30
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exe TID: 4852Thread sleep time: -28563000s >= -30000s
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040B335
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0041B42F
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040B53A
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0044D5E9 FindFirstFileExA,0_2_0044D5E9
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,0_2_004089A9
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00406AC2 FindFirstFileW,FindNextFileW,0_2_00406AC2
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_00407A8C
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00418C69
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,0_2_00408DA7
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0218900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0218900E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0219B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0219B696
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0218B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0218B59C
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021CD850 FindFirstFileExA,0_2_021CD850
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02198ED0 FindFirstFileW,0_2_02198ED0
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02187CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_02187CF3
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02186D29 FindFirstFileW,FindNextFileW,0_2_02186D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,17_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0044D5E9 FindFirstFileExA,17_2_0044D5E9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,17_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00406AC2 FindFirstFileW,FindNextFileW,17_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,17_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,17_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0074900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_0074900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0074B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0074B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0075B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,17_2_0075B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0078D850 FindFirstFileExA,17_2_0078D850
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00747CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,17_2_00747CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00746D29 FindFirstFileW,FindNextFileW,17_2_00746D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00758ED0 FindFirstFileW,17_2_00758ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,20_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,20_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,20_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0044D5E9 FindFirstFileExA,20_2_0044D5E9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,20_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00406AC2 FindFirstFileW,FindNextFileW,20_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,20_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,20_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,20_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0076900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,20_2_0076900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0076B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,20_2_0076B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0077B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,20_2_0077B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007AD850 FindFirstFileExA,20_2_007AD850
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00767CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,20_2_00767CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00766D29 FindFirstFileW,FindNextFileW,20_2_00766D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00778ED0 FindFirstFileW,20_2_00778ED0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,39_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,39_2_0041B42F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,39_2_0040B53A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0044D5E9 FindFirstFileExA,39_2_0044D5E9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,39_2_004089A9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00406AC2 FindFirstFileW,FindNextFileW,39_2_00406AC2
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,39_2_00407A8C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,39_2_00418C69
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,39_2_00408DA7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0098900E __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,39_2_0098900E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0098B59C FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,39_2_0098B59C
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0099B696 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,39_2_0099B696
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009CD850 FindFirstFileExA,39_2_009CD850
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00987CF3 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,39_2_00987CF3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00986D29 FindFirstFileW,FindNextFileW,39_2_00986D29
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00998ED0 FindFirstFileW,39_2_00998ED0
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406F06
              Source: Amcache.hve.4.drBinary or memory string: VMware
              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: yavascript.exe, 00000011.00000002.4553045249.00000000007E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Amcache.hve.4.drBinary or memory string: vmci.sys
              Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.4.drBinary or memory string: VMware20,1
              Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI call chain: ExitProcess graph end nodegraph_17-88065
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeAPI call chain: ExitProcess graph end nodegraph_17-88746
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeProcess queried: DebugPort
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043A65D
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCE3
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00442554 mov eax, dword ptr fs:[00000030h]0_2_00442554
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_005B0083 push dword ptr fs:[00000030h]0_2_005B0083
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021C27BB mov eax, dword ptr fs:[00000030h]0_2_021C27BB
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0218092B mov eax, dword ptr fs:[00000030h]0_2_0218092B
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_02180D90 mov eax, dword ptr fs:[00000030h]0_2_02180D90
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00442554 mov eax, dword ptr fs:[00000030h]17_2_00442554
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00570083 push dword ptr fs:[00000030h]17_2_00570083
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_007827BB mov eax, dword ptr fs:[00000030h]17_2_007827BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0074092B mov eax, dword ptr fs:[00000030h]17_2_0074092B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00740D90 mov eax, dword ptr fs:[00000030h]17_2_00740D90
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00442554 mov eax, dword ptr fs:[00000030h]20_2_00442554
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00680083 push dword ptr fs:[00000030h]20_2_00680083
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007A27BB mov eax, dword ptr fs:[00000030h]20_2_007A27BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0076092B mov eax, dword ptr fs:[00000030h]20_2_0076092B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00760D90 mov eax, dword ptr fs:[00000030h]20_2_00760D90
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00442554 mov eax, dword ptr fs:[00000030h]39_2_00442554
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00560083 push dword ptr fs:[00000030h]39_2_00560083
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009C27BB mov eax, dword ptr fs:[00000030h]39_2_009C27BB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0098092B mov eax, dword ptr fs:[00000030h]39_2_0098092B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00980D90 mov eax, dword ptr fs:[00000030h]39_2_00980D90
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0044E92E GetProcessHeap,0_2_0044E92E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00434168
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043A65D
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00433B44
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00433CD7 SetUnhandledExceptionFilter,0_2_00433CD7
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021B43CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_021B43CF
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021BA8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_021BA8C4
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_021B3DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_021B3DAB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,17_2_00434168
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0043A65D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00433B44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00433CD7 SetUnhandledExceptionFilter,17_2_00433CD7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_007743CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,17_2_007743CF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_0077A8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0077A8C4
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 17_2_00773DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00773DAB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_00434168
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_0043A65D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00433B44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00433CD7 SetUnhandledExceptionFilter,20_2_00433CD7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_007943CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_007943CF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_0079A8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_0079A8C4
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 20_2_00793DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00793DAB
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_00434168
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0043A65D
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00433B44
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_00433CD7 SetUnhandledExceptionFilter,39_2_00433CD7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009B43CF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_009B43CF
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009BA8C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_009BA8C4
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: 39_2_009B3DAB IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_009B3DAB
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00410F36
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe17_2_00410F36
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe20_2_00410F36
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe39_2_00410F36
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00418754 mouse_event,0_2_00418754
              Source: C:\Users\user\Desktop\Wk731bq71c.exeProcess created: C:\Users\user\AppData\Roaming\xenor\yavascript.exe "C:\Users\user\AppData\Roaming\xenor\yavascript.exe" Jump to behavior
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00433E0A cpuid 0_2_00433E0A
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_004470AE
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,0_2_004510BA
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004511E3
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,0_2_004512EA
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004513B7
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,0_2_00447597
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoA,0_2_0040E679
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00450A7F
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_00450CF7
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_00450D42
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_00450DDD
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00450E6A
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_021C7315
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,0_2_021D1321
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_021D1044
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_021D161E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,0_2_021C77FE
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_021D144A
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoW,0_2_021D1551
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: GetLocaleInfoA,0_2_0218E8E0
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_021D0F5E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: EnumSystemLocalesW,0_2_021D0FA9
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_021D0CE6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_004470AE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_004510BA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,17_2_004511E3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_004512EA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,17_2_004513B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_00447597
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,17_2_0040E679
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,17_2_00450A7F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00450CF7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00450D42
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00450DDD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,17_2_00450E6A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00791044
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_00791321
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00787315
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,17_2_0079144A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_00791551
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,17_2_0079161E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,17_2_007877FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,17_2_0074E8E0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,17_2_00790CE6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00790F5E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,17_2_00790FA9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_004470AE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,20_2_004510BA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,20_2_004511E3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,20_2_004512EA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,20_2_004513B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,20_2_00447597
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,20_2_0040E679
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,20_2_00450A7F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_00450CF7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_00450D42
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_00450DDD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,20_2_00450E6A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_007B1044
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,20_2_007B1321
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_007A7315
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,20_2_007B144A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,20_2_007B1551
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,20_2_007B161E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,20_2_007A77FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,20_2_0076E8E0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,20_2_007B0CE6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_007B0F5E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,20_2_007B0FA9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_004470AE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,39_2_004510BA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,39_2_004511E3
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,39_2_004512EA
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,39_2_004513B7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,39_2_00447597
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,39_2_0040E679
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,39_2_00450A7F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_00450CF7
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_00450D42
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_00450DDD
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,39_2_00450E6A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_009D1044
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_009C7315
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,39_2_009D1321
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,39_2_009D144A
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,39_2_009D1551
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,39_2_009D161E
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoW,39_2_009C77FE
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: GetLocaleInfoA,39_2_0098E8E0
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,39_2_009D0CE6
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_009D0FA9
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: EnumSystemLocalesW,39_2_009D0F5E
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00434010
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0041A7A2 GetComputerNameExW,GetUserNameW,0_2_0041A7A2
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: 0_2_0044800F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0044800F
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000014.00000002.2401143387.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365077997.000000000079A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390598572.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4553045249.00000000007E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040B21B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data17_2_0040B21B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data20_2_0040B21B
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data39_2_0040B21B
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040B335
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: \key3.db0_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \key3.db17_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\20_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \key3.db20_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\39_2_0040B335
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: \key3.db39_2_0040B335

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\Wk731bq71c.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983Jump to behavior
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-I7G983
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.2.yavascript.exe.980e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.Wk731bq71c.exe.2200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.yavascript.exe.740e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 39.3.yavascript.exe.21d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.2.yavascript.exe.760e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.3.yavascript.exe.20d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 20.3.yavascript.exe.21a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Wk731bq71c.exe.2180e67.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000014.00000002.2401143387.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365077997.000000000079A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390598572.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4553045249.00000000007E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Wk731bq71c.exe PID: 5588, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 380, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 1352, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: yavascript.exe PID: 7572, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Wk731bq71c.exeCode function: cmd.exe0_2_00405042
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: cmd.exe17_2_00405042
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: cmd.exe20_2_00405042
              Source: C:\Users\user\AppData\Roaming\xenor\yavascript.exeCode function: cmd.exe39_2_00405042
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              11
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts12
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Bypass User Account Control
              2
              Obfuscated Files or Information
              111
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol111
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts2
              Service Execution
              11
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              1
              Software Packing
              2
              Credentials In Files
              1
              System Service Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Windows Service
              1
              DLL Side-Loading
              NTDS3
              File and Directory Discovery
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
              Process Injection
              1
              Bypass User Account Control
              LSA Secrets23
              System Information Discovery
              SSHKeylogging1
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
              Registry Run Keys / Startup Folder
              1
              Masquerading
              Cached Domain Credentials141
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Virtualization/Sandbox Evasion
              DCSync2
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc Filesystem1
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
              Process Injection
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1588924 Sample: Wk731bq71c.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 8 other signatures 2->68 7 Wk731bq71c.exe 1 4 2->7         started        11 yavascript.exe 2->11         started        13 yavascript.exe 2->13         started        process3 file4 48 C:\Users\user\AppData\...\yavascript.exe, PE32 7->48 dropped 50 C:\Users\...\yavascript.exe:Zone.Identifier, ASCII 7->50 dropped 70 Contains functionality to bypass UAC (CMSTPLUA) 7->70 72 Detected unpacking (changes PE section rights) 7->72 74 Detected Remcos RAT 7->74 76 6 other signatures 7->76 15 yavascript.exe 7->15         started        19 WerFault.exe 16 7->19         started        22 WerFault.exe 16 7->22         started        26 6 other processes 7->26 24 WerFault.exe 11->24         started        signatures5 process6 dnsIp7 52 198.23.227.212, 32583, 49704, 50739 AS-COLOCROSSINGUS United States 15->52 54 Multi AV Scanner detection for dropped file 15->54 56 Contains functionality to bypass UAC (CMSTPLUA) 15->56 58 Detected unpacking (changes PE section rights) 15->58 60 5 other signatures 15->60 28 WerFault.exe 15->28         started        30 WerFault.exe 15->30         started        32 WerFault.exe 15->32         started        34 4 other processes 15->34 36 C:\ProgramData\Microsoft\...\Report.wer, Unicode 19->36 dropped 38 C:\ProgramData\Microsoft\...\Report.wer, Unicode 22->38 dropped 40 C:\ProgramData\Microsoft\...\Report.wer, Unicode 26->40 dropped 42 C:\ProgramData\Microsoft\...\Report.wer, Unicode 26->42 dropped 44 C:\ProgramData\Microsoft\...\Report.wer, Unicode 26->44 dropped 46 3 other malicious files 26->46 dropped file8 signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Wk731bq71c.exe53%VirustotalBrowse
              Wk731bq71c.exe74%ReversingLabsWin32.Trojan.LummaStealer
              Wk731bq71c.exe100%AviraHEUR/AGEN.1306956
              Wk731bq71c.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\xenor\yavascript.exe74%ReversingLabsWin32.Trojan.LummaStealer
              C:\Users\user\AppData\Roaming\xenor\yavascript.exe53%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://geoplugin.net/json.gpyavascript.exefalse
                high
                http://upx.sf.netAmcache.hve.4.drfalse
                  high
                  http://geoplugin.net/json.gp/CWk731bq71c.exe, 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Wk731bq71c.exe, 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Wk731bq71c.exe, 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, yavascript.exe, 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, yavascript.exe, 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, yavascript.exe, 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, yavascript.exe, 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, yavascript.exe, 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    198.23.227.212
                    unknownUnited States
                    36352AS-COLOCROSSINGUStrue
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1588924
                    Start date and time:2025-01-11 07:16:31 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 11m 9s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:40
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Wk731bq71c.exe
                    renamed because original name is a hash value
                    Original Sample Name:48773abdad4ef3e8339d4ed2aa02f9d41611e02aefd9e93b0833a2ab99a1619f.exe
                    Detection:MAL
                    Classification:mal100.rans.troj.spyw.expl.evad.winEXE@21/67@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 18
                    • Number of non-executed functions: 384
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.189.173.21, 13.107.246.45, 40.126.24.148, 20.12.23.50
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Report creation exceeded maximum time and may have missing disassembly code information.
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    01:17:57API Interceptor2x Sleep call for process: WerFault.exe modified
                    01:18:17API Interceptor2671161x Sleep call for process: yavascript.exe modified
                    07:17:30AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983 "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                    07:17:38AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Rmc-I7G983 "C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    198.23.227.212yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                      requests-pdf.exeGet hashmaliciousRemcosBrowse
                        E84Ddy7gSh.exeGet hashmaliciousRemcosBrowse
                          advancePayment-pdf.exeGet hashmaliciousRemcosBrowse
                            YESOHDKMIm.exeGet hashmaliciousRemcosBrowse
                              NujUXO42Rg.exeGet hashmaliciousRemcosBrowse
                                ZeaS4nUxg4.exeGet hashmaliciousRemcosBrowse
                                  documents-pdf.exeGet hashmaliciousRemcosBrowse
                                    1kZ9olJiaG.exeGet hashmaliciousRemcosBrowse
                                      ltlbVjClX9.exeGet hashmaliciousRemcosBrowse
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        AS-COLOCROSSINGUSyPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                        • 198.23.227.212
                                        C2R7VV2QmG.exeGet hashmaliciousRemcosBrowse
                                        • 192.210.150.26
                                        8kjlHXmbAY.exeGet hashmaliciousRemcosBrowse
                                        • 192.210.150.26
                                        OKkUGRkZV7.exeGet hashmaliciousRemcosBrowse
                                        • 192.3.64.152
                                        NssBkEQKsI.exeGet hashmaliciousRemcosBrowse
                                        • 192.210.150.26
                                        l1QC9H0SNR.exeGet hashmaliciousRemcosBrowse
                                        • 192.210.150.26
                                        MLxloAVuCZ.exeGet hashmaliciousRemcosBrowse
                                        • 192.3.64.152
                                        bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                        • 192.210.150.26
                                        Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 192.3.27.144
                                        Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 192.3.27.144
                                        No context
                                        No context
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9110122122275264
                                        Encrypted:false
                                        SSDEEP:192:ZOgbuOQy056rQjsAZrsCzuiFHZ24IO8b:ZOSuB556rQjvzuiFHY4IO8b
                                        MD5:C29E45C1C7FBC936F95E2F228D0F7345
                                        SHA1:4C407C0D24F9D6147022CBEF75BBBCF47D30405F
                                        SHA-256:B68CDBFFCBC394BA5DFE4B5D3CBE6CDECE9A4158B4D7E78ADF43CBAA1A2A0046
                                        SHA-512:0B4BB2BD75F352D2019A70DCD4C8AB21A1282E589932AFED626259B8A81A5B128AF078E4B0E68C53C6E0265FFC2D4163C155D095F578612AE44E205B449F2BDB
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.4.9.9.0.2.3.2.8.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.9.5.8.1.d.b.-.6.0.9.0.-.4.7.6.0.-.b.5.8.5.-.9.c.1.a.f.e.8.5.2.b.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.3.4.6.a.e.e.-.d.0.b.e.-.4.e.9.6.-.8.0.3.2.-.9.a.e.9.d.7.2.b.a.b.8.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9246083504682122
                                        Encrypted:false
                                        SSDEEP:192:qgbuQQQy056rQjsAZrsrzuiFHZ24IO8b:qSuQf556rQjOzuiFHY4IO8b
                                        MD5:AC9AAF9343EBAE3E00D68729ED7EB62C
                                        SHA1:2F6AEC63E3B12DF1A2C12EE9597B6E19FC4AE8A0
                                        SHA-256:D5209D70D193B2B4CC2D9A4B31E11BAAFBEB626FC0F5D20199C8EC635B45C1E4
                                        SHA-512:EDA4870401E9DA5496787D59D6F8795F16C55B43FCCD8A33B266D9B66C385CB84D7A16D0B4B0A96FF6EF7B679D5BEA0DB78CA8C52A417EAE1C19476D33B0B62A
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.6.3.9.2.2.3.9.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.9.d.f.7.d.d.6.-.c.2.d.7.-.4.e.9.3.-.8.b.f.6.-.f.7.f.8.b.5.3.9.a.1.a.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.1.1.4.3.b.a.-.f.8.9.6.-.4.0.1.c.-.9.c.0.a.-.d.7.b.0.4.f.5.8.f.1.1.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9248159780265991
                                        Encrypted:false
                                        SSDEEP:192:a+gbuRQy056rQjsAZrsrzuiFHZ24IO8b:a+Su2556rQjOzuiFHY4IO8b
                                        MD5:1FC762E61AE82B2E858EEB473E1A4434
                                        SHA1:E368057B61317FE2E9C199C90AE9ADC6CA485AE1
                                        SHA-256:0FE99336F5654B134B8B9D2678F6784FCC766378CC19D3E4BDD9271238CCE158
                                        SHA-512:9A55F55F28585A1B64ED6029E6DF88167FFB9D2AD31F93093995784B2627FF9CD01BAE46B5D669252D3E50FE021DA995908A00A57FF079C8582DECB7565B7C98
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.1.8.2.1.9.4.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.1.3.3.3.9.e.d.-.a.f.0.a.-.4.3.7.3.-.9.7.b.3.-.5.6.b.a.2.b.9.a.5.b.7.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.6.2.6.7.a.4.9.-.0.0.c.1.-.4.3.e.b.-.8.1.6.5.-.5.7.a.0.b.f.7.e.9.b.9.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9249435026737978
                                        Encrypted:false
                                        SSDEEP:192:pXigbuBQy056rQjsAZrsrzuiFHZ24IO8b:pXiSuG556rQjOzuiFHY4IO8b
                                        MD5:291168A421C5C0AD28B21B7469BC1BF7
                                        SHA1:043EE64096D05EF3FC6EFEE646EEA05102DFDB8B
                                        SHA-256:49DFB7049F5E705C32CF0F475CC7DCE459BCBB67656C994E63395B5B25968293
                                        SHA-512:E9EA512F6C39E88A622519C1356BC06DABAE18882E1812025F520D1BFE6B15B0A2F5D5E4E1DE14DFA10045361D6760E8EE00CBD78C82D9E70B859CECC2F8480C
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.2.9.8.1.1.9.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.c.d.4.b.a.e.0.-.6.7.e.1.-.4.c.a.8.-.a.9.1.5.-.b.b.4.9.d.4.6.5.f.e.d.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.7.3.8.c.1.3.3.-.3.6.5.7.-.4.a.5.7.-.8.1.f.b.-.6.1.6.1.3.4.3.1.b.6.4.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9249783579318623
                                        Encrypted:false
                                        SSDEEP:192:2qgbuG+Qy056rQjsAZrsrzuiFHZ24IO8b:2qSuGR556rQjOzuiFHY4IO8b
                                        MD5:2420D8D71E6EAE1259CB84E32E677456
                                        SHA1:38D86E6E1E5A71273CCE7889D156B976E6A65E71
                                        SHA-256:EC3A98913E6E18AE01A681B21C5AF2D32746B4D721588F2F4DDCAFE0DB08355D
                                        SHA-512:5BCF26E75785B5EA3888CC75AECE95BE2E1009752019BD4E867BA3F2F5A4982F34CA46C91A48EAD472F62B139BB5FAA7A4EA53B6A2EE78C015C0D12CE091F724
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.4.2.4.1.1.3.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.b.9.f.7.6.0.8.-.f.6.2.5.-.4.2.f.8.-.b.c.3.a.-.1.4.9.2.2.0.0.c.7.4.3.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.c.c.8.7.4.b.7.-.6.d.8.1.-.4.0.5.1.-.a.0.e.e.-.6.b.6.a.b.e.4.c.5.e.b.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9245656809882448
                                        Encrypted:false
                                        SSDEEP:192:mZgbusQy056rQjsAZrsrzuiFHZ24IO8b:WSuT556rQjOzuiFHY4IO8b
                                        MD5:E6707A0195B94D84516C53DF29A5E785
                                        SHA1:962D97D6C252E30818A608C482236683AACF2C09
                                        SHA-256:B271A4E07E0AFB65A71BD22420924EB89341462C15B80E41176C2F1363AEB223
                                        SHA-512:5B66B3C5E9D90B605B34293F60690714480C64E4DDF5572777593508820CF812F08DE04F4A80A203BEE27CE9BF37185004DF4699DF37FE7501A0EF125B68C1ED
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.5.5.9.8.1.4.6.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.e.1.b.7.6.f.-.0.9.4.9.-.4.3.7.6.-.a.3.2.0.-.8.0.6.a.e.7.c.3.6.e.0.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.c.e.c.7.8.4.a.-.b.3.3.3.-.4.e.1.d.-.a.6.8.8.-.f.f.3.2.e.2.1.2.5.c.5.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9249158769398113
                                        Encrypted:false
                                        SSDEEP:192:OqgbuQQy056rQjsAZrsrzuiFHZ24IO8b:OqSuf556rQjOzuiFHY4IO8b
                                        MD5:C9882018518DFC6ED4D2BC7AB9B94DCE
                                        SHA1:885F74C47150880C2B11B9F85D860854F509F038
                                        SHA-256:E5B3818D94E12377A6B17FF513FB12D5E3AA296B47AA7ED3288070F1A5BB2291
                                        SHA-512:A19882E261CD6827E374A40F582CB1893CE8B24B6D0A42FD4A3198D20A2E15204A27F5B4940DD44DCAF12D9232A89B8D28377812D4197246A583A16BE77887FD
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.3.5.7.4.0.2.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.e.1.b.f.5.9.-.5.6.5.5.-.4.f.1.8.-.8.1.c.6.-.7.f.8.f.f.a.5.0.a.e.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.f.3.1.d.5.3.6.-.3.d.6.4.-.4.5.d.3.-.9.3.c.0.-.6.8.8.1.8.4.1.0.4.5.0.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):1.0020267961917393
                                        Encrypted:false
                                        SSDEEP:192:dy3gbuKQX01L7/jsAZrswxdzuiFHZ24IO8b:dSSulk1L7/j7zuiFHY4IO8b
                                        MD5:8FF707D92B0E816A3BE0C4BBBB05F195
                                        SHA1:0AC791241D070790351CF9A2B4246D244B673B50
                                        SHA-256:748A6A57A23D9E67F4675C26EDE2CEA86A3B4E2CB149868102DB67F7E9DFD631
                                        SHA-512:C74DDA023C2A320B9641B652740BBC436D21EADE49657BF5E2BFB799B14BD765EA68AECAD561D7930097C4834B43562F84BB6E459F2EBE2FC8A58BA1126B03BB
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.7.4.3.2.4.6.7.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.9.1.3.5.5.9.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.4.c.3.6.2.1.-.3.4.d.7.-.4.6.6.8.-.b.b.9.b.-.c.3.f.8.4.b.0.1.7.3.9.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.0.9.a.6.4.b.e.-.a.9.1.e.-.4.5.a.5.-.8.8.f.5.-.2.b.4.d.c.3.a.2.4.2.4.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.k.7.3.1.b.q.7.1.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.d.4.-.0.0.0.1.-.0.0.1.4.-.2.1.f.7.-.4.e.7.c.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.a.6.b.6.d.c.3.5.3.4.e.2.7.c.4.5.1.9.d.9.6.f.c.a.a.f.d.0.e.3.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.W.k.7.3.1.b.q.7.1.c...e.x.e.....T.a.r.g.e.t.A.p.p.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8938450885898636
                                        Encrypted:false
                                        SSDEEP:192:+SCzV0JsAnbcAPjsAZrbrzuiFHZ24IO8P8:+/z2JsAnbcAPj7zuiFHY4IO8P
                                        MD5:1E13F89CEBEF656CF8CC116B6C4DF26E
                                        SHA1:331481EFB06578AB1955392173403414E86BC840
                                        SHA-256:4DDC5433D7B4EB127A598354AE84137B7BB81242A93CF1E4ED982FAB1FACE9F8
                                        SHA-512:45A13225F6E864564B4A8099C6738CE783B318BA1028973FD900B3509E088985739C4779C17C7B349CDC4B0A467E9DA3025C283E2698DDEFEC26BC220A1609BD
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.1.8.8.4.7.7.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.e.a.0.4.8.3.2.-.e.b.c.e.-.4.3.b.f.-.8.8.3.4.-.c.b.8.7.c.5.a.6.0.9.d.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.2.d.2.d.c.5.1.-.5.a.1.0.-.4.8.f.a.-.a.7.4.4.-.b.b.0.a.9.f.c.c.e.0.1.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.7.c.-.0.0.0.1.-.0.0.1.4.-.6.0.a.5.-.8.1.8.2.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8942015002242155
                                        Encrypted:false
                                        SSDEEP:192:OmT3V0JsAnbcAPjsAZrbrzuiFHZ24IO8P8m:Omj2JsAnbcAPj7zuiFHY4IO8PN
                                        MD5:23ED0E4426AE5E04DAAF265D1EDA953F
                                        SHA1:B651879B50EE311BC785963457654D503035DD72
                                        SHA-256:1CF613FED4463FFCB2A6A0D0F64DAF211AFD0745337F20219FD801199005C698
                                        SHA-512:021E3D471376926D5FA192226C0A02B817781ED0B0E3C38B3CC98893BA380F21427FD5763546E8AAD997EE0FCD3AA52BE0C644F353016E2EBC892DFA41360926
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.6.8.7.8.3.5.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.5.2.7.5.9.6.9.-.f.c.5.a.-.4.5.3.7.-.a.d.4.e.-.d.2.9.9.d.3.2.4.a.4.2.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.a.a.9.d.4.b.6.-.f.8.a.4.-.4.1.b.7.-.8.7.5.6.-.3.3.b.f.c.9.c.f.e.4.8.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.7.c.-.0.0.0.1.-.0.0.1.4.-.6.0.a.5.-.8.1.8.2.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8941119358528479
                                        Encrypted:false
                                        SSDEEP:192:Z0FV0JsAnbcAPjsAZrbrzuiFHZ24IO8P8:Z0F2JsAnbcAPj7zuiFHY4IO8P
                                        MD5:47FE9F67F777C7B28230689E3407580B
                                        SHA1:E886DC772054C757836CA8FE9A9F0969A39CA920
                                        SHA-256:B5F50FE270F40D4ACD416F133D42B5F754662E8970E53D87BA7696AA7DE7FC34
                                        SHA-512:D94BCEFED3454E96EE50297F9E62B5D1792CC422E5517F84FC512E15D19F45C71D8B01ECAEF08FCB35BF1FFC8322BAEDD08460711CD16979C6FD94161B043123
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.4.3.6.2.3.2.8.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.f.f.7.3.e.d.8.-.4.7.b.9.-.4.6.4.d.-.b.b.8.c.-.8.4.9.8.d.1.8.1.e.6.b.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.7.6.6.a.b.4.-.3.b.a.a.-.4.f.5.2.-.9.3.0.4.-.6.3.3.2.7.8.9.b.1.c.6.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.7.c.-.0.0.0.1.-.0.0.1.4.-.6.0.a.5.-.8.1.8.2.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8943584804943915
                                        Encrypted:false
                                        SSDEEP:192:ASSkiYF056rAjsAZrbrzuiFHZ24IO8P8:ApkVm56rAj7zuiFHY4IO8P
                                        MD5:8213BAA415368FF50D4D841C9C2539BE
                                        SHA1:EE9864C40663A87CAE9FF086BA8913BE3291DAA5
                                        SHA-256:6BE423C3186E999776B7FAA4F9250AAFE6B825F302B862DC2C366D98D72696C5
                                        SHA-512:B212ADCE8FF7ABAE17C924333BD2E77A2B023A049B0C86695C7E1ECA189D41F73312E93530C88C3E6A03FF7577D356DBD2F54F83844473A95978F2E8F0A18BFD
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.5.3.6.8.9.4.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.5.7.b.2.2.4.-.e.1.0.d.-.4.4.c.8.-.8.c.4.3.-.9.4.a.0.f.9.2.c.4.f.c.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.c.9.9.3.c.3.8.-.a.f.e.8.-.4.e.b.5.-.8.0.9.b.-.1.0.5.4.0.c.f.d.8.5.a.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.7.c.-.0.0.0.1.-.0.0.1.4.-.6.0.a.5.-.8.1.8.2.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8941936439761718
                                        Encrypted:false
                                        SSDEEP:96:LFSG7AqOv7Bs1h/oA7JfdQXIDcQnc6rCcEhcw3rr+HbHg/wWGTf3hOycoqzIPtZF:ZSGIdF056rAjsAZrbrzuiFHZ24IO8P8
                                        MD5:DDF7B154391328F62009057478B91C15
                                        SHA1:35B9B5AEBA308E609AE76D81A44372AB16D65140
                                        SHA-256:23B6524F2A2EE26D09B2E03835DB28337753248E0B1AA0DE7732C5F6CCB4105B
                                        SHA-512:16475FACD976332C2B87C5C3D1C992830818F40392AB170E3781727A7FA73B0798A57B9DBDD1C35ABC175066438D74D18850BBD1140462D2FC47D2D64850E892
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.2.8.6.0.6.0.2.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.2.8.2.8.d.a.-.6.5.a.5.-.4.b.e.2.-.b.f.1.3.-.5.0.e.9.b.4.9.b.6.9.8.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.0.0.9.3.b.7.b.-.2.6.9.b.-.4.d.a.9.-.b.1.0.3.-.d.d.7.f.4.8.4.7.e.f.6.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.7.c.-.0.0.0.1.-.0.0.1.4.-.6.0.a.5.-.8.1.8.2.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8663427869113852
                                        Encrypted:false
                                        SSDEEP:96:v6LAqOvvs1h/oA7JfdQXIDcQnc6rCcEhcw3rr+HbHg/wWGTf3hOycoqzIPtZrXOr:C4vF056rAjsAZr0zuiFHZ24IO8P8
                                        MD5:6C89BA5EB526DDF7AF5C488CCA062F3B
                                        SHA1:8EC8D725D71FDD89EAA2FBF531D200542C959881
                                        SHA-256:3165100D418B517346E802B53B853A146015D8042DC57EE964B3FEF9BD61315C
                                        SHA-512:F21CEE5D8F83758EF84B8000D4932DD10E5141CCA9B2E7F6F80A9A1B97D9686C7F2AAC5ADEC0DB8473E33EACEFDA7DA9F87E5BC4B2314A02B0443362FF8353F0
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.5.9.2.5.9.1.3.9.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.9.d.3.3.d.4.-.2.f.e.3.-.4.5.d.f.-.9.5.7.7.-.a.b.e.2.a.0.a.d.d.b.e.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.d.6.4.e.1.6.c.-.3.0.7.2.-.4.b.0.7.-.9.e.7.6.-.2.d.3.3.1.3.6.8.5.f.7.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.7.c.-.0.0.0.1.-.0.0.1.4.-.6.0.a.5.-.8.1.8.2.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8738317884282657
                                        Encrypted:false
                                        SSDEEP:96:fukY1AqOvAs1h/oA7JfdQXIDcQnc6rCcEhcw3rr+HbHg/wWGTf3hOycoqzIPtZrF:fnrAF056rAjsAZrbzuiFHZ24IO8P8
                                        MD5:4BC9256EC80B2C20CE8AD98222B9609B
                                        SHA1:0D1945C92FD279234F9182EFD184476AC1CBFC6E
                                        SHA-256:AEC28221DC972F315AC1F5EEC8F112C3CB003F4953A1187367B099B44BB6CE80
                                        SHA-512:81415A86F76156A68EDEA40B420278BE97A097405A8118F95A61393E0E0D8DD858539C1AAEB61A9EBA9042D76E200A916BDB71EAA9C9D0E3DD57F3000F164DC2
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.0.2.1.6.2.3.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.1.0.d.9.2.2.-.d.4.4.1.-.4.d.b.6.-.b.b.0.7.-.2.7.4.5.d.5.b.d.b.c.d.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.5.c.a.a.a.c.-.7.6.8.f.-.4.1.8.2.-.9.9.d.1.-.9.b.6.b.9.8.3.0.0.5.0.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.1.7.c.-.0.0.0.1.-.0.0.1.4.-.6.0.a.5.-.8.1.8.2.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1././.0.1.:.0.8.:.2.9.:.3.1.!.0.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....B.o.o.t.I.d.=.4.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8495739940066651
                                        Encrypted:false
                                        SSDEEP:96:hj4AqOvIs1h/H7if+QXIDcQic6NcEVcw3zN7+HbHg7PB6HeaOy1oVazWtZrwnVfZ:F7IP08Jf14jC3ZrqzuiFHZ24IO8P8
                                        MD5:AC3269583730598290280A798D3E86CD
                                        SHA1:492B2C4C3D3E45B441FED7C1D9F25E09F36F32BD
                                        SHA-256:1CE7D917E7E8AE8A888FD6EDC3F14E56AD24914EF2A5C2F1F3C6B79199278BA8
                                        SHA-512:F345DFD9D950DDB789053277F5DBFCB13ACB53E747B0BB86FFCA2E5A114CDFC5DBE09D92D38B301B709094F0B8A46AE607907A24FD8D50E0B7740AC0002E789C
                                        Malicious:false
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.1.1.0.0.6.6.7.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.4.9.8.6.1.7.1.0.0.4.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.8.3.8.a.d.c.-.f.b.7.f.-.4.8.2.d.-.a.1.5.9.-.0.9.a.8.a.1.8.e.e.e.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.3.4.2.9.c.e.4.-.1.8.4.7.-.4.a.7.5.-.8.6.d.2.-.8.a.2.3.2.5.0.0.f.5.6.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.a.v.a.s.c.r.i.p.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.4.8.-.0.0.0.1.-.0.0.1.4.-.3.5.d.9.-.5.8.8.3.f.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.c.1.e.b.a.f.9.5.8.1.3.4.e.6.7.4.a.7.a.7.b.d.1.6.3.6.2.9.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.3.d.8.4.1.1.e.6.3.c.5.5.9.9.c.d.3.c.8.5.e.d.3.0.6.e.2.e.0.4.5.6.2.c.0.7.9.!.y.a.v.a.s.c.r.i.p.t...e.x.e.....T.a.r.g.e.t.A.p.p.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:30 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):61460
                                        Entropy (8bit):2.3612482092152
                                        Encrypted:false
                                        SSDEEP:384:F2hSmkvrYzmxdUI2y9rbjjL7o9WJpGt+:F2hSHvrYaxdGy9bvwspd
                                        MD5:2278531A950556DA02732F9F83724830
                                        SHA1:A72BB4C0D8051755106733A75599CEA85E24253C
                                        SHA-256:47F7B11F1AEDF9967CC8C971BADDB18E27B8A02C6F772E6DE01F5C415F080E60
                                        SHA-512:B388800085F2ACB4771CD3B9598245673B69F669C0A21A8184FD4535098731CAAB6421ECD80A1D50EB933D20C215C6C9F937F99D8829F44568196B0781EDB541
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g....................................D..../..........T.......8...........T...........@%..............`...........L...............................................................................eJ..............GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8352
                                        Entropy (8bit):3.7053994910917503
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJWS6II/S6YEIESUmNgmf2vpB089b9vsfB/m:R6lXJz6q6YE7SUmNgmf2h9Ufk
                                        MD5:CDABE091F73BC92F9EAF817156DEA423
                                        SHA1:1F4F58554BD3CACC9A0B0B087DA1630FEE3CF471
                                        SHA-256:2820221794AFE728635CD5596160404CD18AE5D89A04223C8B23E16C5313C24E
                                        SHA-512:413A0115A3A80696CB25CD9D3D99CB8F0F20CE33FACDBA2547B78F59B24260EAE77A9D822B68325EB98A5A60E0201CB90D1F563D4715A97B99ADB0FA7B6C8F43
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.494583444686799
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYXeYm8M4J6CFKw+q8MrNwKAPhpd:uIjfPI7h97VsXJ+wZh2hpd
                                        MD5:1C498AFE95361168D61626FB9F9952D7
                                        SHA1:19F28AED835FFD6D8D3FE7929BF33AFD46C550C0
                                        SHA-256:CB9C1BEB288A0A5BE2F1994F1ED72FFD45CEAA3206D4499F3E84EEE0FEF584B2
                                        SHA-512:7CC171BD03D3DA5B85A4F6066725AB423A18390359CDCDE7F7F39F88F889CF78605C41CEE71B079A4EA845F6C0F7B535084FF53B0814C8C5DA0BC2F34BFB412C
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:32 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):89336
                                        Entropy (8bit):2.3801377256294765
                                        Encrypted:false
                                        SSDEEP:768:dB+VNByvh04GYoku7Q24Ljxpr47Y9bvceD6y:2c04GrF4xprKibvccx
                                        MD5:D45D39DA5593579DCFA650A298691B07
                                        SHA1:1A9AFB1DA8E5B344D3418D806D4814E145C4DB47
                                        SHA-256:1B1EE49A2F6FDFBBE90BC93FE89B444B2C6E76E5CF2A85DD22056CCAB9DFAF94
                                        SHA-512:BD95EEA1F36D08BB86BEEC6CC75CB3F8DE0B54EFC3859F24857C35F66C9CC438D471A27A5618386B1FAB40451EEE70BB2D81AD1BD6CBF042908EC2D904E2A932
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g............T...........l...\.......D....9..........T.......8...........T............*..h2......................................................................................................eJ......L.......GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8350
                                        Entropy (8bit):3.7052632867324813
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJW66rj6YEISSU5TkcGgmf2vpB089bvvsfy+lm:R6lXJr6f6YE9SU5ygmf2BvUfyd
                                        MD5:5E0B22522528F6D2ED85EEF8DE7837F5
                                        SHA1:0CAD36B55B8F1593836A547FBECF2BAE95A5E347
                                        SHA-256:723CE7E507761E255767FD9D56AF2BCB0D1583E1BF357A9B6FB19D4CF3F562CF
                                        SHA-512:55560F0018502E3782B76638D36D8E794A70994D8267979A5409D136F1CB012387019166F0FD6675AE62FE54FE8EEE5CD20C6E4BC10AA75BB8568B19D4BF57CD
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.49703708471431
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYsYm8M4J6CF2+q8MrNwKAPhpd:uIjfPI7h97VoJqZh2hpd
                                        MD5:EE0BF28AB0F6E333B76644D30F53149D
                                        SHA1:01CB47308A1AE871202F8116FB7EE4472FDDC9EE
                                        SHA-256:695F02BA8EBA0AB187D939C8750C202BE7E18E13DAD3E55D0F309BE2C9E2807F
                                        SHA-512:B7284F050E7D0FAE773D7F1CD20C3D7C8CCD3F2FE90826136A2DC4E69B10C01277FDF66786D6DA137E7A5D20FE5562AE50391892315F7617012B112A920181C1
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:33 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):93548
                                        Entropy (8bit):2.285968564385245
                                        Encrypted:false
                                        SSDEEP:384:v+mtHSBKkvPWdd5igo3H/Vr7+Vn9LkILj+apr473I9rbjjL70zQHomV8IBhxhIRz:v+m9SBDvPWcgoi9xLjxpr47Y9bvc4v
                                        MD5:F1407A5E9423A69D960CA6D9156FE2DF
                                        SHA1:C19450A4D2A27A89E21775CF1955E5D4F6051141
                                        SHA-256:B88ED432324C30ABC398F5F12D73B12F7CFAA77FE849C9A488B1979235C3DEB4
                                        SHA-512:86E7D2D5DB8CD0DB63FA9FADD4AA53F9F58E51CF871CBA2B94862D544279EAADB4725B5445D7739423B7822A3FF917D27A6B1B4B1203CE950A08B297F335FA8C
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................l...........D....<..........T.......8...........T...........@*..,C......................................................................................................eJ......|.......GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8350
                                        Entropy (8bit):3.703602357365648
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJWW696YEIdSU5TkcGgmf2vpB089bmvsf0ttim:R6lXJH696YEiSU5ygmf2BmUfMZ
                                        MD5:103930F4B36C8050395FF020A2A55E85
                                        SHA1:B3DB098A4CC36BDD2E293BC08DE622D79F762466
                                        SHA-256:724A90A68408B8D720B3B38FC5F95584BAD88FAE94F4349C0C36CA809EBE60F8
                                        SHA-512:0AFAB91654544F0109BB362CD99F6A9848A461A7A173E24B6A6A7448805B21BC21EE9385897EEE9CCA6DE8492681DFF3CF880346125093660B7D2DDB226BA3D4
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.498246010177809
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYpYm8M4J6CFf+q8MrNwKAPhpd:uIjfPI7h97VhJDZh2hpd
                                        MD5:F9ADE081DA1B5FF13DBF116FA8DE6424
                                        SHA1:0745D14E8DEDC5A00DEB69D537D93CDDECB3EE7E
                                        SHA-256:060D447E1D1D2717FB29C8F9E138B57FF09B507A07AC8E3ED62C47B50678741C
                                        SHA-512:7D534556289513219F6C05AA04D2967EB291B38DB479FD3162D7C1D75C8C68D1AB0CC109548466047C09268116CD1A1D216793B8151CF856CB045B49659BF4FB
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:33 2025, 0x1205a4 type
                                        Category:modified
                                        Size (bytes):93692
                                        Entropy (8bit):2.31767165049681
                                        Encrypted:false
                                        SSDEEP:768:T9SBev7Kgop5TrsMLjxpr47Y9bvocixyDW:gyKN5TQMxprKibvoDoW
                                        MD5:509AE196F81893665926BE4A97010372
                                        SHA1:A28FE6BA2E2B2818B5288E6B760CA9CB867F9C6C
                                        SHA-256:C8E8584E13605031FACB0A7BDBA62DC538CDD8CEE9BB97D17712BBB64A8BBA0E
                                        SHA-512:9FE7E0A864BA8D2FCDABA5B601CAC1E62F0BC8041D328AB6401B7666FBC5C0434406B0A15E82582FFE2058D2B96DE90178AB9260590801EE5AF1C7CC4D844B5B
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................l...........D....<..........T.......8...........T............*..DC......................................................................................................eJ......|.......GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8350
                                        Entropy (8bit):3.705384403962197
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJWO626YEIoSUnTkcGgmf2vpB089bmvsf6im:R6lXJf626YE3SUnygmf2BmUfW
                                        MD5:82C3F2D3B781D65906F261057BF63681
                                        SHA1:FB9BAE8569F6EB86CD79F7D10EB16FC1172E16BD
                                        SHA-256:B0FECD588D0D688B41B85A04A08E4C5B9F2BF3D2CCB2384E3EF58F51C37B7D8E
                                        SHA-512:5AB6D2406A6CCA9243B4115D2A29A317B26CCA5FA03F4FE27846076EE6AFDEEDB852D9AB87CB215F68B4FE668B93F31BF5708099EAAC1C0292DCAFEB4C99F9AC
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.49823670488229
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYYvYm8M4J6CFDD+q8MrNwKAPhpd:uIjfPI7h97VryJHDZh2hpd
                                        MD5:FA2499F67DE0A7ED7661AA5035A34738
                                        SHA1:3CEB1C9BEFC943E51B48E41A57D32920B6777046
                                        SHA-256:9156E110834F9F68C5961BE77A55CBE2D0E7D271FB28332C34C3A87D6FA84B9A
                                        SHA-512:0E9B1ABDEFF8BB7626E5DDD58579ACEC816D91BE911AF24D067D14A1DC82E771337956EEDC6CA0C3AFADEFF26BDEE77B2A303990896D92A40CB572A5996D5A54
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:34 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):100450
                                        Entropy (8bit):2.0850396549625274
                                        Encrypted:false
                                        SSDEEP:384:9RgHQCzeyD+EkvfTnOWOQzGIkQXr3rs+J219rbjjL/097uSWRBLGBH:9RgHQCzeBNvbnxOQRrrrs+JI9bvoQSaM
                                        MD5:074826467BE0E845588F4EE151398A47
                                        SHA1:D3DB397E106F2938C95D586A6FC2A1316F279F67
                                        SHA-256:613D2CC270E4A47A25CB067AB67DAED1988DDECB2E7BF2F8086F346717C31A35
                                        SHA-512:4067A38EFD01C3079AD193FB5C00ECAD5F6E1B937D37986D7E7D77A6FB89AE84241329DC785EB1F1C2F47C9F8FCB311AF98F6B42BCC1F1EF054CC5D25F0A8545
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................l................B..........T.......8...........T............+...\..........X...........D...............................................................................eJ..............GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8350
                                        Entropy (8bit):3.7055569445859224
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJWj6e6YEI9mSUNukcGgmf2vpBa89bZvsfSfzm:R6lXJy6e6YEzSUNfgmf2zZUfSy
                                        MD5:AC37E6E8ED75EADADCB6271E18BC6A34
                                        SHA1:EF02F47B840418521A213919EEFDD9F4F4EA431F
                                        SHA-256:E66EF6927231F71E276C425841A10EB5C1A49EDA4ECF086B03B286FFF1EBB8CA
                                        SHA-512:C8060067C1D735851CFD9E26752BF8E2940E910F7559411B257975842167EAAD95C8296E3B02DEEA8EF04EFD1B7528D043F9530766FC723F2CF12EFBF58A3FD7
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.4953523693984305
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYOYm8M4J6CFB+q8MrNwKAPhpd:uIjfPI7h97VuJFZh2hpd
                                        MD5:DACA85C0D2CEA5976E2D1F8BBF6BBB13
                                        SHA1:0EDEE5C998EA6B8E1F8118CA0F1C51A90F42EF88
                                        SHA-256:479DAE48527B7C5C0ECB256F9CED2ABFC73555374B11298AF567ECA78322D9BF
                                        SHA-512:2DCB6108BD818A9B7A4281EB1A36ADB5CE9384338281ABD1E51FA9EAD207907B77B42C6DE85DAD1885066C0FC266C2D532CAD212D7016FAC9435341F4AF8B54C
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:35 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):100026
                                        Entropy (8bit):2.097129195332874
                                        Encrypted:false
                                        SSDEEP:768:WCq8QCzeDFvakaeRKsrskSQJI9bvcemYqpL:d1CAD0KsQTQEbvcemYY
                                        MD5:4CC37BC44BFB7387ABED7FF32EC863AE
                                        SHA1:20F34A6451DCEA71890D3BD43211D99A1F116198
                                        SHA-256:210516500092E3D14A79C0BE23041A0A0384CFA786A427AF0D8DDB485BCE1CEC
                                        SHA-512:C5D15FE17CC492490CD0208C70969EB8A0ACFB7A89D8AFC79BD3EE0519D3AEB44738F78A5E6DB981ED3B3202228B3AF5AB4714A70312169EA0D01F7CAAABF31D
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................l................B..........T.......8...........T............+...[..........X...........D...............................................................................eJ..............GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8350
                                        Entropy (8bit):3.7039113508302317
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJWG6I76YEI3SUq8gmf2vpBy89bQvsf0dwm:R6lXJX6c6YE4SUq8gmf2bQUfC
                                        MD5:64B3B2F375228744C3156437E66148DA
                                        SHA1:008CCD024ED949315FD2FBCB3B38319DC80D3E32
                                        SHA-256:30B1A43A94CCF70C236510FC265A0AD42F078E1B2B4ECD66B8CAC9E6DBA7C908
                                        SHA-512:D29CA20276B2398C08B0F3A89BE7D2E11072400D0D08EDCEE67B5104ED42046DD2B9444B442DE738D59412DBE62622887923D9E2B94ED1B32F568C2DA1123C2D
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.4977110674980185
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYp0Ym8M4J6CFPA+q8MrNwKAPhpd:uIjfPI7h97VIBJzAZh2hpd
                                        MD5:177BA6B757E5637E4C0B495D5BB72F2A
                                        SHA1:0A2BAEF3856B04B46973459BFC650B1847302BD6
                                        SHA-256:C292AFF6D08BEBA587ABC976E832B35EA2EBF41F66AF9B316FF70DC7B559F95A
                                        SHA-512:762A4F5174B08B62D81F0406AC9AF7F137FE5DAFE302AC7100B582419E5A9FCF0804A9420DED110CB2F99377E8133C52FA2807E758D6C9B0F860FC731D8D9845
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:36 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):99602
                                        Entropy (8bit):2.1060412753059197
                                        Encrypted:false
                                        SSDEEP:384:GGQCzey+kvqQOHg3yIzGIOWzYXr3rsoJ219rbjjL708jBzGpKHGED+L:GGQCzeqv9IgCIRfgrrsoJI9bvciWKH5
                                        MD5:FFC70120CC101E9A095A35F32291E473
                                        SHA1:8F40D67813811D2F0BF8B532B67928A417C55E6A
                                        SHA-256:EEF283E4102B4046EFFAC27196EE4B23801AB8C0ADCB337340A2482F904DFD7C
                                        SHA-512:C203C9B0EA8392E69B21CB99E4C737FBB05CFC9229D12ED252451402A7B9A4EA6740101AE9A59FF85CD0677189E92E71FA18744F0F5ED8711FFD0E96C93F454C
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................l................B..........T.......8...........T............+..jY..........X...........D...............................................................................eJ..............GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8352
                                        Entropy (8bit):3.705756436377581
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJWjw6G6YEI9SUek1JhGgmf2vpBT89bLvsf1Zm:R6lXJ4w6G6YEiSUekMgmf2ULUfS
                                        MD5:B0365E3686422D0AEA1A0DDA9C5A9FA1
                                        SHA1:7BEACB09C2CF2A74700B61D724E59D3A17C2ABF7
                                        SHA-256:70968B8AFABE32C8F7E8D507077B901291F62B1A03AEBB31CF608CE843370827
                                        SHA-512:3FA520BDCE1FA3ED70BA12F116D9881AAC7CA40A4B7C94361627DBAED97BCCCEEF6B8155251D098B5400C7BCF90863F4F0B7E814B3E6E63086173D55FF47AD23
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.496161238468022
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYVYm8M4J6CFS+q8MrNwKAPhpd:uIjfPI7h97VRJOZh2hpd
                                        MD5:A20CED91455CE28D399B9695DCBF23D1
                                        SHA1:0E4EA3CB6D365DF1BA760B7DA0B32552B141077B
                                        SHA-256:2D46C0FA2F671BF72502BD104A6DDC74F5CE3085BF61683368FFC41FE741684C
                                        SHA-512:E8F91AF698EA624100A51D2659DF2D25AC5FD9C70625E2806C4826F05C61BC60AB22194A1579491722B988D18431F376D63CD1FEF448A1DDFBE4C0E10B7E9619
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:38 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):44264
                                        Entropy (8bit):2.719520316524428
                                        Encrypted:false
                                        SSDEEP:192:wfXfQXT9QD5nXB6kcAxOLYCfIbbc2ee+0AO/dHRnIWbCf4u8nLf9qM00Ph5NsweL:V9QVR6k5kvudp+0lDINjwJeEb
                                        MD5:365238AD1C5ADF7C8F6F1E9A65326845
                                        SHA1:894B662C9CE1C39BCFBF739F9EEC0B781F1256CB
                                        SHA-256:495960C73506F9EE14DDCA66EBFFD09DEE9CF671439AAB0E4B362C12224EB3C3
                                        SHA-512:0AF68FB4ED37EE19E36C1D5B402D277B5714BDA5D27A32950C9051986D3C804C090B2565A6F538A2D91347E5546C114CAA07C755BE44203547616B423B82E63D
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g............4...............<.......t....-..........T.......8...........T...........H1...{....................... ..............................................................................eJ......d!......GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8316
                                        Entropy (8bit):3.702415150375426
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJWL6IdX6YEIISU1wxGgmfVfpDP89b1vsfHnm:R6lXJC6IdX6YEXSU1PgmfVq1UfG
                                        MD5:B9B252CA9B9C7C2EAF433A2DD7381F08
                                        SHA1:9D8B576F76D4BAE60DA56326EF18F865D79C08D8
                                        SHA-256:49EC72837B9DCD496FDF9041919F7A9D10DDA806D52675115FBF97178B5C4BD1
                                        SHA-512:7CA9C63A6435BCA99DFA6A22CA1130B03749E6D755DA166BA037DE04A8EF339D4A709447C9359E5762D47C6C2B4559BF186024136F046EAD52671F446A6E45DD
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.8.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4579
                                        Entropy (8bit):4.461652329628742
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYzYm8M4J6hFqv+q820NwKAPhpd:uIjfPI7h97VjJtv4h2hpd
                                        MD5:5DC066B2B9D9FE78F36A599F4A37B501
                                        SHA1:B256B851C1BA43EAE017DA705D853D747A74773A
                                        SHA-256:118E4B901F2595A85F5D7E298477C3A29EBC0EA5BD2E93C72B3B43751A34C67A
                                        SHA-512:BCF382AF286F6FDD4D1B9BF0A4FCCB7A7E306C1BB5B10FEB18867A99EF1990B746E031D089613D7A7235594A59B4E3E991F1EDA328C94C358878C086353889FA
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:39 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):64382
                                        Entropy (8bit):2.2201141865353207
                                        Encrypted:false
                                        SSDEEP:192:BR8pXjlQ7XYQimfDOLXt1zo0UYIztcSKPTNjCvVQ58VMPkD/N9HcvgVcGT5wrnLF:b87Q0jmShFIztcSITJwpDIMd5wH3yi
                                        MD5:1F87E63E90D5795985201E85F6B248DF
                                        SHA1:42DBF877DCDD526AB3B64D0CE062B0F3507F8CE6
                                        SHA-256:30F67550F2FF4FDE992DDE93ABCF5BB20AB9C90F98B4CDBC87FC5D33730EC846
                                        SHA-512:70525BFAE29D1DF20FD6F0C2408D8FF2359DC96ADF3C7B8B8944B3CC3E00C15DD579784543E7AC68909710A682F23DFAC80DA04D767865988ACA345F80360B2D
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................................./..........T.......8...........T...........(...V.......................................................................................................eJ...... .......GenuineIntel............T.......|......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8328
                                        Entropy (8bit):3.7004210018737553
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJiU6gu+6YWr6AFvgmfXvpBB89bs7sf0kkm:R6lXJB6gu+6YS6AFvgmfXesAfL
                                        MD5:EA6CAC29DFAB6196BAD3485B2E948F1D
                                        SHA1:BDABCADB9DF654ACD3AAA996EA66B5A19A69BB62
                                        SHA-256:2BB6A48BE4BF2773AA869368A7F33289542C2C3A14B5F272307062318377B044
                                        SHA-512:CDCA0FB55E8878A8188F0A691B4717822BE1678E6444835B547A7160930950A13CEBBBB72E68D319D52BBF75EF86352B5DAE2B6FD22B7909451A93753405CAB5
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.0.<./.P.i.d.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.482256618547428
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYfjYm8M4JSCFpo+q8JS8+A0qcd:uIjfPI7h97VbJNoP8+dqcd
                                        MD5:6D59700B635BEA60D81029469650C74E
                                        SHA1:B4DC5496B98497B4F14B790E25385B22B3D41161
                                        SHA-256:35C2D358C54D96E9AD5B493C21F365A88CED8A7D0270D9858ADF3A909C9D858F
                                        SHA-512:93709F080C3BF7F829B11C92B09149CF2A461C3CB6525548CBDC2C99BF9E91C8F6569AC4C69BA1B759870CD28E2C36EE99D979937EB811F5E4CA814E1A0EC4B8
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:40 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):63218
                                        Entropy (8bit):2.231605725631877
                                        Encrypted:false
                                        SSDEEP:192:CNXTeX02JsNOLXt2ToYUYIkRcjNZsGQUvVQ58VMPkD/NzHcvgVcGcSGGcv4qX:c2JsAh2LIkRcnsGQypD+MOSc4q
                                        MD5:EEA737351E0B2F0CA87CD13647E865CE
                                        SHA1:903553D5D2FB58850EF2F0B8AECB5359D2192306
                                        SHA-256:E8C624851E71BA37EB25CAE58959510C1C08BEDD44B57A45922D085A7281A7FE
                                        SHA-512:9763EA0FDA21A474EC73168F0721002F68DDCFFD1F2D6599B7ECA0518EC09DFD09AD42A6C1CFF06373670CF159EB858042F50E3B9010CA9E7C1DF038D3A644B0
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................................./..........T.......8...........T...........x...z.......................................................................................................eJ..............GenuineIntel............T.......|......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8328
                                        Entropy (8bit):3.702440873622415
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJik6jq+6YWR6AFvgmfXvpBG89bq7sf4uum:R6lXJR6jq+6Y46AFvgmfXfqAft
                                        MD5:3B6A15660CC2B823CFE1F18B913CC543
                                        SHA1:7849BE7CCFB679763BEC0303BE426ECE80ECE1D4
                                        SHA-256:4DA8F9B2A209229BC1B818B48684B502EAD720DA0B60213B54B687F96B697644
                                        SHA-512:DD29384585C1D13B1DFB34B4EB56B2BDA1C6966FF80AFADB44D6EFAADE23FCDC5C6E2B085EADF94FE8665A61F71B519F828259D7CB1BB2259A8ADEBB66940D5D
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.0.<./.P.i.d.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.4793420376858135
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYyYm8M4JSCFL+q8JS8+A0qcd:uIjfPI7h97VGJ3P8+dqcd
                                        MD5:7B4AE4F4D999BB607132181BA7A3B5D2
                                        SHA1:8D7CCCF94788A89E3071C2D5EA6E9D8FE698E7F4
                                        SHA-256:3A65886490D6DF23073BEF1723B9EBFC9EA0E135BA441A233DEA5D5E626FCAB0
                                        SHA-512:2336442FD07570FD1FE28D6D9AF70B0527552F2CB21679F5E4E8D33EDE85FCEED0087A0CACA2941A3C648CCC5EF4B4EA8297B7A41803FB9A47092A75C14443E1
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:41 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):30226
                                        Entropy (8bit):2.6458598555507717
                                        Encrypted:false
                                        SSDEEP:192:DaHaXUVZvXjVC5OPXqr+eH6wpuHMvN7eoqVsq/b:mZZ7VxSaYFpJ5Mzb
                                        MD5:A4B74060F27303546D05B35304779D15
                                        SHA1:358790AE036086BFBA0CF1D143058FB4380FB2A9
                                        SHA-256:5FFB6149BD59607B2D3F89F108B55A3715522219B78D50322705088157DCB9AE
                                        SHA-512:D266B13BE2E4C9CE6F7E8CB8AB47795884282E11240F5ABA4E131302A1CE46336E331BC667379EBF90F72D85638DFBD30239E24E9867589449B18EBB16B4F2E6
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g............4...........\...<...........|!..........T.......8...........T...........(....`......................................................................................................eJ..............GenuineIntel............T.......H......g............................. ..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8306
                                        Entropy (8bit):3.6932919059577087
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJk16H6YEIgSU1S6igmflltpD/89bzRsfnxm:R6lXJm6H6YEvSUzigmflqzKfM
                                        MD5:26E6A570DA6344E805E7434F6BEC64FE
                                        SHA1:D3047D1B72D82115832EE52DFCA0D2B5F19DF676
                                        SHA-256:8681CB88B7E98C2DE400E18D8D3698141A3A36F2B3A23BFD68BCA723F8CCF7C7
                                        SHA-512:86F49397ADE8A22AAD5004A4382BE1B6DCE63AF4B106A813AD40BAE82A76F4D7DFC7B7777B9D9112C4C951C5A00DFBA068E4EE268493523DC73D5EA128BA0F69
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.3.5.2.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4579
                                        Entropy (8bit):4.440259237417129
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYXYm8M4JSIFfo+q8Ur8+A0q4d:uIjfPI7h97VnJyd8+dq4d
                                        MD5:C0A46D26824A68CB59AE304F48FA7D45
                                        SHA1:FF0F425E719109E21521FC3AF1F42C868815A183
                                        SHA-256:A807533D9377C89E87692BF693F82FF72D11C0E06F4196A0FDE1B10BDF612A8C
                                        SHA-512:31B09618AE41C4E01DAF8DC8D0E1C01CC5B5B0D0F9CF7F2E4CD278BE2801D20143A2429ADFFFDBA9EB28EC5ECE64177F94E03599AD86DC55313F3E94A1D4E248
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:42 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):62308
                                        Entropy (8bit):2.2336694670158828
                                        Encrypted:false
                                        SSDEEP:192:M9XkU0DXXdYAMBOLXtgBoYUYHiUdNpghn1Xv2wvVQ58VMPkD/NzHcvgVcGlSJxis:WedYZ0hgdHiUuhn1rpD+MvSKs
                                        MD5:EB57209ACF4CFAC7F8318BDCFE9D18E1
                                        SHA1:FB04391BED5C316E9EDC386B4E8D3218ED794A20
                                        SHA-256:F4021C35F0912C75CEFA2C045D98C5F78866D38D91780E75624EC90541F5E8D6
                                        SHA-512:685257531D9CD9F9C3E744209325224E284F07BE56381403694F979EE32439237B9EFAA001DB9EABEA0C3C359547E43D8A9A76D08A529A48BEB4EB1E42582A40
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................P...............(1..........T.......8...........T...........................L...........8...............................................................................eJ..............GenuineIntel............T.......|......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8328
                                        Entropy (8bit):3.7009861650396756
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJi66+dHK6YW26AFvgmfnaAjAQpBr89b47sf+SBIm:R6lXJf6+dHK6Yf6AFvgmfnaAjAb4Af+E
                                        MD5:8D1F75F26543E6D7064D9A84F53CFDBD
                                        SHA1:0FB3450579888E04667BB468F3F19F2B566AF63D
                                        SHA-256:639E54159F4F7465A4A2A23BB4FE50AF3706E9262BC53B1F0D4BF929DC6A8AF5
                                        SHA-512:F4587FA0A9FD8C6E3D7E576606F8AD47CA8C4D75E07D4BE0936C525F09739AED8BC5D5D8EBF84B8949F7D137BAAE9A0821FCF53BEC10240FDA2E1804E5AB2B46
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.0.<./.P.i.d.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.475136212163989
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VY8Ym8M4JSaFZ+q8xS8+A0qcd:uIjfPI7h97VIJtn8+dqcd
                                        MD5:19AE7D8CCCB7FE93D4DC6B7CFC9361AE
                                        SHA1:3EE067642E780420AEADB13ECD9E726ADCD5513C
                                        SHA-256:2E4B908E36A349D20D9B9A76AFA47BD34754CB7FFA94BE38FB12234202560870
                                        SHA-512:62BAD51DC15265B218B52B3A036E09B16363436E7ABCB10941887BE35239236BD4A1A8DC56E8F4D6461D460418B24AF0DB4D60AB70EFEA6B502BDF24852FF61B
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:43 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):63752
                                        Entropy (8bit):2.241872068551189
                                        Encrypted:false
                                        SSDEEP:192:tiXkU0DXXdYAM9lOLXtgifMoYUYIkD4s6NSGTJvVQ88VMPkD/NzHcvgVcGYJB+Ha:SedYZGhgHIkD4SGTHID+M2JBcRE
                                        MD5:5B8FF2FD244C694C3356698C8CCBEEAB
                                        SHA1:AFA32556B01A8931529622F57B30A3345C0E6D80
                                        SHA-256:4D0647CB4D9951EEDE51542E33DB8D9A2150B18D7F8753E360037AE9325EC64D
                                        SHA-512:7541E13AF0A0D233BBC814E890757DF0DE95463F350E7DEC7249AC3216D228D90112B71EDE7D9498CA407D46E32CABC0135A61CFE2CA75D525FBC7BC5E365B76
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................P...............(1..........T.......8...........T...........0...............L...........8...............................................................................eJ..............GenuineIntel............T.......|......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8328
                                        Entropy (8bit):3.701897321233611
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJif6HL46YWU6AFDgmfXvpB089bB7sfBSeLm:R6lXJa6HL46YN6AFDgmfXBBAfBE
                                        MD5:45302A519B1B758D6C87C3DC7708221B
                                        SHA1:466ABA02AA2D5136837C199CEC201FE260B47E51
                                        SHA-256:1CC6111C9C66604CC358C7565CAFF15DF6A79AFDC50667E21FC7F71C2D15FB10
                                        SHA-512:26E93F84D874B1C0160F8DA2FA32E0F4CF8056DA7632C3960CD1715C84CDD2B147E305E1B5AC4FD9000AD89DF02A4BF096622E0B3712F3AB0C6725FEACDAEFE1
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.0.<./.P.i.d.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.481812538376337
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYyYm8M4JSCFa3m+q8JS8+A0qcd:uIjfPI7h97VCJNP8+dqcd
                                        MD5:A60B3B0CD4889E295AF8B95FCF7D6EFF
                                        SHA1:E909C6FB3E8FF1ECCD6E62A53B08868278159174
                                        SHA-256:997D6160D0B871605E25C28BA96742BFCDBC7B820792DCFD28824DCCA0E9F29B
                                        SHA-512:6B09070A490120BF08F604149CAAD7B45E1D86DD50610472E388AAA621636E3EF454D9D26C8C3071F7D1FB17FF435C102BB4D9B7B964EE65873C95AC14D9FCCA
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:44 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):62386
                                        Entropy (8bit):2.2335574439676833
                                        Encrypted:false
                                        SSDEEP:192:u8XkU0DXXdYAMyEOOLXtg4woYUYHiUB+NWghcXzvQwvVQ88VMPkD/NzHcvgVcGXj:PedYZXJhg4sHiUChcXNID+MROJuo
                                        MD5:4E954A91E61846993A017BEA50249231
                                        SHA1:DC58B65873FBB911310E3E2958AFBD3FAAC70ADC
                                        SHA-256:B8D9F9ADCC7E34B3BACA682B9DE77439B0D2D136A30D64938351D3AC558BD7A2
                                        SHA-512:D6AC1B5BB266EE22B3E3A51444CEFADEC6F141D2F3212DF808F77738ED7CBB82F5AFCBC946B726F2ADDEC7DEB06BAC97CCC9289E67D332ABB930EE834623DBB3
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................P...............(1..........T.......8...........T...........................L...........8...............................................................................eJ..............GenuineIntel............T.......|......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8328
                                        Entropy (8bit):3.701009670964665
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJi56HLK6YWd6AFDgmfnaAjAQpBT89bO7sf0WS6m:R6lXJ86HLK6Yk6AFDgmfnaAjATOAfDm
                                        MD5:E2722CDCC67D06DA5BC81701509FCC01
                                        SHA1:A7E45CDC942490221125EC9E89C2CE9772D5999F
                                        SHA-256:C85F33EC637922A8639C39CF5B736C0FFDFBEDE1E643299B83E5B84F952C4A9E
                                        SHA-512:523138F041AA770CABA4428DEC7076C06E15B59E958B9BDDE4E120B61C442C67EB7CFB15F17B74DE716BF931B6D5875D3FCC21BEAF4214E0D29227C4DDCEB535
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.0.<./.P.i.d.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.478378258144582
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VYUYm8M4JSaFzuL+q8xS8+A0qcd:uIjfPI7h97VgJHAn8+dqcd
                                        MD5:AA674BC7BF9B3ABDD73D12CFBC363445
                                        SHA1:14857146E9D83253A4817DCE06C919A1A457B976
                                        SHA-256:EA4DF0A0BDCFA27662AC156616F9CF9D50D70793085B738CA487C002F8F870F7
                                        SHA-512:CAE6B440791A1B6369573A93A93D139CEDA154F36C9568539C8B590EC495BEB79D326D7B3F6682143FAAE5994E35B6156F522B48483DCC8750925F37F8BDB01F
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:45 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):63850
                                        Entropy (8bit):2.2439734667010693
                                        Encrypted:false
                                        SSDEEP:384:xedYZ8/2MChgHIkD4wIGDWHID+MYfPK8Ncod:xe6LMChgo84z6QITf8eQ
                                        MD5:C127CC5C50B2A8370785AC02C4991EEF
                                        SHA1:EC4C2BA4949D101076D36C318114EA017033067F
                                        SHA-256:EE894D9598335F9FE62362525859EF65FB657EC2433FC61BB1CAD9AC2D853C96
                                        SHA-512:D74C9146BEBFA6C9EB548F11AC7E9999F9B497E032F3FCD97602A2502000359CD98476EB269102FB57A142244755A5F4484C45BE3CC6C4E0F478D49263828B36
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................P...............(1..........T.......8...........T...........X...............L...........8...............................................................................eJ..............GenuineIntel............T.......|......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8328
                                        Entropy (8bit):3.70225654858035
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJiV6mGUbWe6YWe6AFDgmfXvpBT89bX7sfvSM9m:R6lXJg6mPj6YH6AFDgmfXUXAfKL
                                        MD5:F12A7A58FAE4869C547F766925EF0F2B
                                        SHA1:4A4D1E664A9A9E6216660EED4EDEC26FF014A986
                                        SHA-256:6DBC982911A343FAFA7608F98E94C59CD700D7D268932E6265C5368045289D80
                                        SHA-512:29C068E5C4230BBBBD5BCBA8348842B6D6B7D57D363CB968AD99871095788A8D0D0BE5B3735F6201C15D01C5D61AF64533F9B2D1CE80BBF8FAD75727EDDBF6DC
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.0.<./.P.i.d.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.479979773435043
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VY+toYm8M4JSCFgh+q8JS8+A0qcd:uIjfPI7h97V/tFJ6P8+dqcd
                                        MD5:1EE1F6F707493A5E84FDDCC4199D73B7
                                        SHA1:5F66E3499ADB1CE76231C2A7B6D89C1DE7DD75AB
                                        SHA-256:5741C15158F19A8458BC7942309B505AFC4A0B72AF06BC2E2B311FB1BA5F3989
                                        SHA-512:FD9C28743BA397FCB67036E5F711FDCAB173A801EE53E4A019483448B58003EF012E3AA47FBD2D9152B31078E1F8768749545C2D641476FE6F3672C6AC455ABD
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 06:17:47 2025, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):62484
                                        Entropy (8bit):2.235081606531886
                                        Encrypted:false
                                        SSDEEP:192:plXkU0DXXdYAMnIXOLXtg4foYUYHiUFqNlghoYPvQwvVQ88VMPkD/LzHcvgVcGy6:TedYZI+hg4HHiUFhhoYpID0MgGC6mY
                                        MD5:AF9DE6695971113653D6971319D12551
                                        SHA1:D1E6F77A5CE2F2317204933563B5018245FEFEB0
                                        SHA-256:5D76A91C38DF55AF2997B41C8DDA2C2112156DD9B53F6E4BC637272845C0D264
                                        SHA-512:78DF69633FF2119346C4DC1E12C0BD9C8D78236C096D4A7DA77E46051D9B9B658FA3020C01E611DCBA5A3564562DAD697618CABCC405B20D0BC383CCA24DD3A7
                                        Malicious:false
                                        Preview:MDMP..a..... ..........g........................P...............(1..........T.......8...........T...............4...........L...........8...............................................................................eJ..............GenuineIntel............T.......|......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8330
                                        Entropy (8bit):3.7005304744220524
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJij06TGU/We6YWG6AFDgmfnaAjAQpBa89bl7sfItXm:R6lXJU06TPn6Yv6AFDgmfnaAjA0lAfIQ
                                        MD5:7D60E249B853C7F62D20046707713F3A
                                        SHA1:2D5C62F6589E29CDD19D0937E0252F542B0F8F74
                                        SHA-256:A8BCC4F73EE8552229A20AF09BB5DD786EC21B950C4D9098CA1614F87DBAA370
                                        SHA-512:75259ED0609823349DDBB8519C98A7C5E8284CF6F4F23B1B7F279AF8648F48298C4094D461F4A95EA73D7C97DCBA74C72FC2271F312144CEF5B89B765F7F322B
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.0.<./.P.i.d.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4619
                                        Entropy (8bit):4.4800207209277625
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs1Jg77aI9P9yWpW8VY+Ym8M4JSaFaI+q8xS8+A0qcd:uIjfPI7h97VOJPn8+dqcd
                                        MD5:22370EFAFC06F6BCF74D0F17A3FB971E
                                        SHA1:8FC8151EA634FF07BCC463ACAE88ED775C8D69CB
                                        SHA-256:3C2EA243CDC3178423CC9806533004A73D3BC98FAD35E7F33F2C25A60749ECCC
                                        SHA-512:131CA2559092C2B037435370CDE899EDFA795EB8A59528E0097D85497BD36F333A4DFA5C8586D487491786F79AF4C56C94FE370826984C5ECAB0FC475DD941E3
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670880" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Users\user\Desktop\Wk731bq71c.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):526848
                                        Entropy (8bit):6.580922202789991
                                        Encrypted:false
                                        SSDEEP:12288:do1AcqnUMOYXUDCe+NaxMVkb7LrTwrC+X:doGHUMOL1AawkLrYC+X
                                        MD5:78C37A72C91559ED73B7CBEC99534BFC
                                        SHA1:7813D8411E63C5599CD3C85ED306E2E04562C079
                                        SHA-256:48773ABDAD4EF3E8339D4ED2AA02F9D41611E02AEFD9E93B0833A2AB99A1619F
                                        SHA-512:05A46F20499096180EC46B9B25E97A5B539AA0D70FC5C0B9884B4438FF9503A6AFEB44495DFDA9D312BD254DE830EE45C1EF431B9356311EE0BEACD51685D2AD
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 74%
                                        • Antivirus: Virustotal, Detection: 53%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........G...........................`............`.......................Rich...................PE..L....0]e.................d..........b.............@.................................k........................................j..(....@..h=..................................................P8.......8..@............................................text....c.......d.................. ..`.data...........d...h..............@....rsrc...h=...@...>..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\Wk731bq71c.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.424300188633747
                                        Encrypted:false
                                        SSDEEP:6144:/Svfpi6ceLP/9skLmb0OTqWSPHaJG8nAgeMZMMhA2fX4WABlEnN80uhiTw:KvloTqW+EZMM6DFyi03w
                                        MD5:A6F904C6A7265BF61631BB6EC28E7005
                                        SHA1:FE6FD50862B30CBB1CD4FD092056678419B23A29
                                        SHA-256:3AA67F0F39E4318EAEF1A0DA2564BA7869ADCE4495665782BACAF8EEE8B9789A
                                        SHA-512:FBF7DEFE6A212B3B7E81D20E531B28AA84D8E05DEDC96EB3AB0D6A91206F89DDD73DBAB745F2995DDEBDBB0091D358B244E61D54CF086DD70450E5BF59DED746
                                        Malicious:false
                                        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmZ. ~.c................................................................................................................................................................................................................................................................................................................................................7J........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):6.580922202789991
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:Wk731bq71c.exe
                                        File size:526'848 bytes
                                        MD5:78c37a72c91559ed73b7cbec99534bfc
                                        SHA1:7813d8411e63c5599cd3c85ed306e2e04562c079
                                        SHA256:48773abdad4ef3e8339d4ed2aa02f9d41611e02aefd9e93b0833a2ab99a1619f
                                        SHA512:05a46f20499096180ec46b9b25e97a5b539aa0d70fc5c0b9884b4438ff9503a6afeb44495dfda9d312bd254de830ee45c1ef431b9356311ee0beacd51685d2ad
                                        SSDEEP:12288:do1AcqnUMOYXUDCe+NaxMVkb7LrTwrC+X:doGHUMOL1AawkLrYC+X
                                        TLSH:B7B401227684C132F2AA453489258BB50A7FBC324F745ACF7BD4166D5F213E39A3139B
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........G................................`...............`...........................Rich....................PE..L....0]e...........
                                        Icon Hash:606118181828d161
                                        Entrypoint:0x408562
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                        Time Stamp:0x655D3013 [Tue Nov 21 22:32:51 2023 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:0
                                        File Version Major:5
                                        File Version Minor:0
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:0
                                        Import Hash:86ca2c7441a7bc06fdbf2f953fda5780
                                        Instruction
                                        call 00007F5F80E412A4h
                                        jmp 00007F5F80E39BAEh
                                        mov edi, edi
                                        push ebp
                                        mov ebp, esp
                                        push ecx
                                        push ebx
                                        push esi
                                        push edi
                                        push dword ptr [004830CCh]
                                        call 00007F5F80E3F0ECh
                                        push dword ptr [004830C8h]
                                        mov edi, eax
                                        mov dword ptr [ebp-04h], edi
                                        call 00007F5F80E3F0DCh
                                        mov esi, eax
                                        pop ecx
                                        pop ecx
                                        cmp esi, edi
                                        jc 00007F5F80E39DB9h
                                        mov ebx, esi
                                        sub ebx, edi
                                        lea eax, dword ptr [ebx+04h]
                                        cmp eax, 04h
                                        jc 00007F5F80E39DA9h
                                        push edi
                                        call 00007F5F80E412F3h
                                        mov edi, eax
                                        lea eax, dword ptr [ebx+04h]
                                        pop ecx
                                        cmp edi, eax
                                        jnc 00007F5F80E39D7Ah
                                        mov eax, 00000800h
                                        cmp edi, eax
                                        jnc 00007F5F80E39D34h
                                        mov eax, edi
                                        add eax, edi
                                        cmp eax, edi
                                        jc 00007F5F80E39D41h
                                        push eax
                                        push dword ptr [ebp-04h]
                                        call 00007F5F80E3CD79h
                                        pop ecx
                                        pop ecx
                                        test eax, eax
                                        jne 00007F5F80E39D48h
                                        lea eax, dword ptr [edi+10h]
                                        cmp eax, edi
                                        jc 00007F5F80E39D72h
                                        push eax
                                        push dword ptr [ebp-04h]
                                        call 00007F5F80E3CD63h
                                        pop ecx
                                        pop ecx
                                        test eax, eax
                                        je 00007F5F80E39D63h
                                        sar ebx, 02h
                                        push eax
                                        lea esi, dword ptr [eax+ebx*4]
                                        call 00007F5F80E3EFF7h
                                        pop ecx
                                        mov dword ptr [004830CCh], eax
                                        push dword ptr [ebp+08h]
                                        call 00007F5F80E3EFE9h
                                        mov dword ptr [esi], eax
                                        add esi, 04h
                                        push esi
                                        call 00007F5F80E3EFDEh
                                        pop ecx
                                        mov dword ptr [004830C8h], eax
                                        mov eax, dword ptr [ebp+08h]
                                        pop ecx
                                        jmp 00007F5F80E39D34h
                                        xor eax, eax
                                        pop edi
                                        pop esi
                                        pop ebx
                                        leave
                                        ret
                                        mov edi, edi
                                        push esi
                                        Programming Language:
                                        • [ASM] VS2008 build 21022
                                        • [C++] VS2008 build 21022
                                        • [ C ] VS2008 build 21022
                                        • [IMP] VS2005 build 50727
                                        • [RES] VS2008 build 21022
                                        • [LNK] VS2008 build 21022
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x76a100x28.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x840000x3d68.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x38500x18.text
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x38080x40.text
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x10000x1b0.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x763e80x764008c98071e93d761585a36057179f6f0c3False0.6923621663583509data6.794491623040473IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .data0x780000xb0dc0x64003d6262b975856e37535ad5ec9a063128False0.0909765625data1.2243989912689799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x840000x3d680x3e00f387d1a0f098e0a7cba2d0feb1a973cbFalse0.6203377016129032data5.5339823829562285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0x842100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6831797235023042
                                        RT_ICON0x842100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6831797235023042
                                        RT_ICON0x848d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilIndia0.6404564315352697
                                        RT_ICON0x848d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilSri Lanka0.6404564315352697
                                        RT_ICON0x86e800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilIndia0.7189716312056738
                                        RT_ICON0x86e800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilSri Lanka0.7189716312056738
                                        RT_STRING0x875700x358dataTamilIndia0.48014018691588783
                                        RT_STRING0x875700x358dataTamilSri Lanka0.48014018691588783
                                        RT_STRING0x878c80x49edataTamilIndia0.44416243654822335
                                        RT_STRING0x878c80x49edataTamilSri Lanka0.44416243654822335
                                        RT_ACCELERATOR0x873180x50dataTamilIndia0.825
                                        RT_ACCELERATOR0x873180x50dataTamilSri Lanka0.825
                                        RT_GROUP_ICON0x872e80x30dataTamilIndia0.9375
                                        RT_GROUP_ICON0x872e80x30dataTamilSri Lanka0.9375
                                        RT_VERSION0x873680x208data0.5423076923076923
                                        DLLImport
                                        KERNEL32.dllGetComputerNameA, GetTempFileNameW, EnumCalendarInfoA, WriteConsoleInputW, TlsGetValue, SetComputerNameExA, InterlockedDecrement, GetCurrentProcess, GetLogicalDriveStringsW, InterlockedCompareExchange, WriteConsoleInputA, GetModuleHandleW, FindNextVolumeMountPointA, EnumTimeFormatsW, LoadLibraryW, GetCalendarInfoW, GetVersionExW, FindNextVolumeW, GetFileAttributesW, GetDevicePowerState, LCMapStringA, VerifyVersionInfoW, GetLastError, GetCurrentDirectoryW, SetLastError, GetProcAddress, VirtualAlloc, CreateJobSet, CopyFileA, SetFileAttributesA, GetAtomNameA, LoadLibraryA, InterlockedExchangeAdd, SetCalendarInfoW, OpenEventA, GetCommMask, EnumDateFormatsA, GlobalUnWire, FreeEnvironmentStringsW, GetShortPathNameW, GetDiskFreeSpaceExW, ReadConsoleInputW, EnumCalendarInfoExA, GetVolumeInformationW, InterlockedIncrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, HeapFree, TerminateProcess, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetCPInfo, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, HeapAlloc, HeapCreate, VirtualFree, HeapReAlloc, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, SetHandleCount, GetFileType, GetStartupInfoA, SetFilePointer, CloseHandle, GetModuleFileNameW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, GetStringTypeA, GetStringTypeW, InitializeCriticalSectionAndSpinCount, SetStdHandle, GetConsoleCP, GetConsoleMode, FlushFileBuffers, GetLocaleInfoW, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA
                                        Language of compilation systemCountry where language is spokenMap
                                        TamilIndia
                                        TamilSri Lanka
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-11T07:17:23.273173+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549704198.23.227.21232583TCP
                                        2025-01-11T07:17:44.603427+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550739198.23.227.21232583TCP
                                        2025-01-11T07:17:47.207810+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550756198.23.227.21232583TCP
                                        2025-01-11T07:17:49.833857+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550773198.23.227.21232583TCP
                                        2025-01-11T07:17:52.410141+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550791198.23.227.21232583TCP
                                        2025-01-11T07:17:55.010489+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550811198.23.227.21232583TCP
                                        2025-01-11T07:17:57.647123+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550831198.23.227.21232583TCP
                                        2025-01-11T07:18:00.282944+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550854198.23.227.21232583TCP
                                        2025-01-11T07:18:02.882976+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550870198.23.227.21232583TCP
                                        2025-01-11T07:18:05.489528+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550886198.23.227.21232583TCP
                                        2025-01-11T07:18:08.068120+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550902198.23.227.21232583TCP
                                        2025-01-11T07:18:10.799441+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550918198.23.227.21232583TCP
                                        2025-01-11T07:18:13.396350+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550939198.23.227.21232583TCP
                                        2025-01-11T07:18:16.003666+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550955198.23.227.21232583TCP
                                        2025-01-11T07:18:18.598012+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550973198.23.227.21232583TCP
                                        2025-01-11T07:18:21.174409+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550989198.23.227.21232583TCP
                                        2025-01-11T07:18:23.776232+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551003198.23.227.21232583TCP
                                        2025-01-11T07:18:26.398654+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551022198.23.227.21232583TCP
                                        2025-01-11T07:18:29.021689+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551027198.23.227.21232583TCP
                                        2025-01-11T07:18:31.618444+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551028198.23.227.21232583TCP
                                        2025-01-11T07:18:34.458801+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551029198.23.227.21232583TCP
                                        2025-01-11T07:18:37.055003+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551030198.23.227.21232583TCP
                                        2025-01-11T07:18:39.644610+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551031198.23.227.21232583TCP
                                        2025-01-11T07:18:42.242043+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551032198.23.227.21232583TCP
                                        2025-01-11T07:18:44.831036+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551034198.23.227.21232583TCP
                                        2025-01-11T07:18:47.431417+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551035198.23.227.21232583TCP
                                        2025-01-11T07:18:50.036187+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551036198.23.227.21232583TCP
                                        2025-01-11T07:18:52.636299+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551037198.23.227.21232583TCP
                                        2025-01-11T07:18:55.260360+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551038198.23.227.21232583TCP
                                        2025-01-11T07:18:57.864798+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551039198.23.227.21232583TCP
                                        2025-01-11T07:19:00.442481+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551040198.23.227.21232583TCP
                                        2025-01-11T07:19:03.040022+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551041198.23.227.21232583TCP
                                        2025-01-11T07:19:05.648558+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551042198.23.227.21232583TCP
                                        2025-01-11T07:19:08.191417+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551043198.23.227.21232583TCP
                                        2025-01-11T07:19:10.722973+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551044198.23.227.21232583TCP
                                        2025-01-11T07:19:13.208232+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551045198.23.227.21232583TCP
                                        2025-01-11T07:19:15.660277+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551046198.23.227.21232583TCP
                                        2025-01-11T07:19:18.100308+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551047198.23.227.21232583TCP
                                        2025-01-11T07:19:20.507259+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551048198.23.227.21232583TCP
                                        2025-01-11T07:19:22.879361+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551049198.23.227.21232583TCP
                                        2025-01-11T07:19:25.242635+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551050198.23.227.21232583TCP
                                        2025-01-11T07:19:27.587765+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551051198.23.227.21232583TCP
                                        2025-01-11T07:19:29.880259+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551052198.23.227.21232583TCP
                                        2025-01-11T07:19:32.164191+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551053198.23.227.21232583TCP
                                        2025-01-11T07:19:34.447164+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551054198.23.227.21232583TCP
                                        2025-01-11T07:19:36.729454+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551055198.23.227.21232583TCP
                                        2025-01-11T07:19:39.112202+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551056198.23.227.21232583TCP
                                        2025-01-11T07:19:41.316259+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551057198.23.227.21232583TCP
                                        2025-01-11T07:19:43.488815+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551058198.23.227.21232583TCP
                                        2025-01-11T07:19:45.730557+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551059198.23.227.21232583TCP
                                        2025-01-11T07:19:47.884274+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551060198.23.227.21232583TCP
                                        2025-01-11T07:19:50.008399+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551061198.23.227.21232583TCP
                                        2025-01-11T07:19:52.098472+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551062198.23.227.21232583TCP
                                        2025-01-11T07:19:54.180315+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551063198.23.227.21232583TCP
                                        2025-01-11T07:19:56.239826+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551064198.23.227.21232583TCP
                                        2025-01-11T07:19:58.309017+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551065198.23.227.21232583TCP
                                        2025-01-11T07:20:00.899853+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551066198.23.227.21232583TCP
                                        2025-01-11T07:20:03.233972+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551067198.23.227.21232583TCP
                                        2025-01-11T07:20:05.633015+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551068198.23.227.21232583TCP
                                        2025-01-11T07:20:07.634005+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551069198.23.227.21232583TCP
                                        2025-01-11T07:20:09.618838+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551070198.23.227.21232583TCP
                                        2025-01-11T07:20:11.663772+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551071198.23.227.21232583TCP
                                        2025-01-11T07:20:13.867437+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551072198.23.227.21232583TCP
                                        2025-01-11T07:20:15.836743+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551073198.23.227.21232583TCP
                                        2025-01-11T07:20:17.788320+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551074198.23.227.21232583TCP
                                        2025-01-11T07:20:19.937328+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551075198.23.227.21232583TCP
                                        2025-01-11T07:20:22.322011+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551076198.23.227.21232583TCP
                                        2025-01-11T07:20:24.224900+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551077198.23.227.21232583TCP
                                        2025-01-11T07:20:26.149639+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551078198.23.227.21232583TCP
                                        2025-01-11T07:20:28.134681+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551079198.23.227.21232583TCP
                                        2025-01-11T07:20:30.088532+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551080198.23.227.21232583TCP
                                        2025-01-11T07:20:32.054443+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551081198.23.227.21232583TCP
                                        2025-01-11T07:20:33.990435+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551082198.23.227.21232583TCP
                                        2025-01-11T07:20:35.884432+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551083198.23.227.21232583TCP
                                        2025-01-11T07:20:37.756136+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551084198.23.227.21232583TCP
                                        2025-01-11T07:20:39.847535+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551085198.23.227.21232583TCP
                                        2025-01-11T07:20:41.739564+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551086198.23.227.21232583TCP
                                        2025-01-11T07:20:43.633374+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551087198.23.227.21232583TCP
                                        2025-01-11T07:20:45.458947+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551088198.23.227.21232583TCP
                                        2025-01-11T07:20:47.352455+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551089198.23.227.21232583TCP
                                        2025-01-11T07:20:49.242202+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551090198.23.227.21232583TCP
                                        2025-01-11T07:20:51.290947+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551091198.23.227.21232583TCP
                                        2025-01-11T07:20:53.254488+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551092198.23.227.21232583TCP
                                        2025-01-11T07:20:55.160147+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551093198.23.227.21232583TCP
                                        2025-01-11T07:20:57.074621+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551094198.23.227.21232583TCP
                                        2025-01-11T07:20:59.415387+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551095198.23.227.21232583TCP
                                        2025-01-11T07:21:01.383487+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551096198.23.227.21232583TCP
                                        2025-01-11T07:21:03.303898+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551097198.23.227.21232583TCP
                                        2025-01-11T07:21:05.232450+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551098198.23.227.21232583TCP
                                        2025-01-11T07:21:07.148408+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551099198.23.227.21232583TCP
                                        2025-01-11T07:21:09.530566+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551100198.23.227.21232583TCP
                                        2025-01-11T07:21:11.425892+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551101198.23.227.21232583TCP
                                        2025-01-11T07:21:13.344412+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551102198.23.227.21232583TCP
                                        2025-01-11T07:21:15.084578+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551103198.23.227.21232583TCP
                                        2025-01-11T07:21:17.046674+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551104198.23.227.21232583TCP
                                        2025-01-11T07:21:18.927294+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551105198.23.227.21232583TCP
                                        2025-01-11T07:21:20.934562+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551106198.23.227.21232583TCP
                                        2025-01-11T07:21:23.152454+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551107198.23.227.21232583TCP
                                        2025-01-11T07:21:25.378958+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551108198.23.227.21232583TCP
                                        2025-01-11T07:21:27.338961+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551109198.23.227.21232583TCP
                                        2025-01-11T07:21:29.259614+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551110198.23.227.21232583TCP
                                        2025-01-11T07:21:30.958094+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551111198.23.227.21232583TCP
                                        2025-01-11T07:21:33.696503+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551112198.23.227.21232583TCP
                                        2025-01-11T07:21:35.590795+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.551113198.23.227.21232583TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 11, 2025 07:17:39.419604063 CET4970432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:39.424685955 CET3258349704198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:39.424922943 CET4970432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:40.561083078 CET5072453192.168.2.51.1.1.1
                                        Jan 11, 2025 07:17:40.566015959 CET53507241.1.1.1192.168.2.5
                                        Jan 11, 2025 07:17:40.566241980 CET5072453192.168.2.51.1.1.1
                                        Jan 11, 2025 07:17:40.576178074 CET53507241.1.1.1192.168.2.5
                                        Jan 11, 2025 07:17:41.003804922 CET3258349704198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:41.004015923 CET4970432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:41.109345913 CET5072453192.168.2.51.1.1.1
                                        Jan 11, 2025 07:17:41.414237022 CET5072453192.168.2.51.1.1.1
                                        Jan 11, 2025 07:17:41.419579983 CET53507241.1.1.1192.168.2.5
                                        Jan 11, 2025 07:17:41.419670105 CET5072453192.168.2.51.1.1.1
                                        Jan 11, 2025 07:17:41.998687029 CET4970432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:41.998738050 CET4970432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:42.003482103 CET3258349704198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:42.003643036 CET3258349704198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:43.007900953 CET5073932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:43.012692928 CET3258350739198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:43.012851000 CET5073932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:43.017529011 CET5073932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:43.022314072 CET3258350739198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:44.603183985 CET3258350739198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:44.603426933 CET5073932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:44.603758097 CET5073932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:44.608625889 CET3258350739198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:45.617415905 CET5075632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:45.622191906 CET3258350756198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:45.623408079 CET5075632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:45.627484083 CET5075632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:45.632313013 CET3258350756198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:47.207731009 CET3258350756198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:47.207809925 CET5075632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:47.207974911 CET5075632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:47.212811947 CET3258350756198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:48.225863934 CET5077332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:48.230705023 CET3258350773198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:48.230796099 CET5077332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:48.234534025 CET5077332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:48.239259958 CET3258350773198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:49.833794117 CET3258350773198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:49.833857059 CET5077332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:49.833991051 CET5077332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:49.838829041 CET3258350773198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:50.840049982 CET5079132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:50.844872952 CET3258350791198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:50.845129967 CET5079132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:50.849282980 CET5079132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:50.854118109 CET3258350791198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:52.409181118 CET3258350791198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:52.410140991 CET5079132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:52.411215067 CET5079132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:52.416038036 CET3258350791198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:53.414347887 CET5081132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:53.419332981 CET3258350811198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:53.419406891 CET5081132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:53.423629045 CET5081132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:53.428463936 CET3258350811198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:55.008059025 CET3258350811198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:55.010488987 CET5081132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:55.013940096 CET5081132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:55.018760920 CET3258350811198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:56.023643970 CET5083132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:56.028712034 CET3258350831198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:56.028810978 CET5083132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:56.033149004 CET5083132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:56.038111925 CET3258350831198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:57.647022009 CET3258350831198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:57.647123098 CET5083132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:57.651099920 CET5083132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:57.655848980 CET3258350831198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:58.711617947 CET5085432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:58.716551065 CET3258350854198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:17:58.716648102 CET5085432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:58.720716000 CET5085432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:17:58.725548983 CET3258350854198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:00.282869101 CET3258350854198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:00.282943964 CET5085432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:00.283116102 CET5085432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:00.287960052 CET3258350854198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:01.289249897 CET5087032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:01.294166088 CET3258350870198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:01.294352055 CET5087032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:01.298243046 CET5087032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:01.303119898 CET3258350870198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:02.882885933 CET3258350870198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:02.882976055 CET5087032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:02.883127928 CET5087032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:02.887953997 CET3258350870198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:03.898564100 CET5088632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:03.903557062 CET3258350886198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:03.903645039 CET5088632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:03.907773018 CET5088632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:03.912642956 CET3258350886198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:05.489190102 CET3258350886198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:05.489527941 CET5088632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:05.489527941 CET5088632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:05.494339943 CET3258350886198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:06.492465973 CET5090232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:06.497267008 CET3258350902198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:06.497353077 CET5090232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:06.502484083 CET5090232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:06.507298946 CET3258350902198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:08.067117929 CET3258350902198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:08.068120003 CET5090232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:08.068304062 CET5090232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:08.073107958 CET3258350902198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:09.223583937 CET5091832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:09.228528976 CET3258350918198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:09.228610992 CET5091832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:09.233006954 CET5091832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:09.237898111 CET3258350918198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:10.799349070 CET3258350918198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:10.799441099 CET5091832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:10.799583912 CET5091832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:10.804369926 CET3258350918198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:11.804889917 CET5093932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:11.809767962 CET3258350939198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:11.810923100 CET5093932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:11.817811012 CET5093932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:11.822551012 CET3258350939198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:13.396230936 CET3258350939198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:13.396349907 CET5093932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:13.396531105 CET5093932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:13.401516914 CET3258350939198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:14.398533106 CET5095532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:14.403397083 CET3258350955198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:14.403517962 CET5095532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:14.407701015 CET5095532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:14.412527084 CET3258350955198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:16.003593922 CET3258350955198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:16.003665924 CET5095532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:16.003832102 CET5095532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:16.008754969 CET3258350955198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:17.008315086 CET5097332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:17.013175964 CET3258350973198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:17.016155958 CET5097332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:17.021549940 CET5097332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:17.026287079 CET3258350973198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:18.597913980 CET3258350973198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:18.598011971 CET5097332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:18.598182917 CET5097332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:18.602957010 CET3258350973198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:19.601624012 CET5098932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:19.606427908 CET3258350989198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:19.606511116 CET5098932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:19.610435963 CET5098932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:19.615365028 CET3258350989198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:21.173120975 CET3258350989198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:21.174408913 CET5098932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:21.174556971 CET5098932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:21.179320097 CET3258350989198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:22.180238008 CET5100332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:22.185103893 CET3258351003198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:22.185213089 CET5100332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:22.189429045 CET5100332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:22.194298983 CET3258351003198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:23.773574114 CET3258351003198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:23.776232004 CET5100332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:23.776304007 CET5100332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:23.781084061 CET3258351003198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:24.789283991 CET5102232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:24.794137001 CET3258351022198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:24.794321060 CET5102232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:24.798341990 CET5102232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:24.803145885 CET3258351022198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:26.398586035 CET3258351022198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:26.398653984 CET5102232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:26.398787975 CET5102232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:26.404192924 CET3258351022198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:27.414397955 CET5102732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:27.419356108 CET3258351027198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:27.419462919 CET5102732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:27.425057888 CET5102732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:27.429971933 CET3258351027198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:29.021579027 CET3258351027198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:29.021688938 CET5102732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:29.021975994 CET5102732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:29.026710033 CET3258351027198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:30.023755074 CET5102832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:30.028534889 CET3258351028198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:30.028635979 CET5102832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:30.032371044 CET5102832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:30.037831068 CET3258351028198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:31.618372917 CET3258351028198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:31.618443966 CET5102832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:31.618586063 CET5102832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:31.623420000 CET3258351028198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:32.633022070 CET5102932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:32.883280039 CET3258351029198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:32.883411884 CET5102932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:32.953075886 CET5102932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:32.957966089 CET3258351029198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:34.458697081 CET3258351029198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:34.458801031 CET5102932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:34.458942890 CET5102932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:34.463721037 CET3258351029198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:35.461092949 CET5103032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:35.466531992 CET3258351030198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:35.466631889 CET5103032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:35.470331907 CET5103032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:35.475155115 CET3258351030198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:37.054894924 CET3258351030198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:37.055002928 CET5103032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:37.055344105 CET5103032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:37.060695887 CET3258351030198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:38.070417881 CET5103132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:38.075215101 CET3258351031198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:38.075330973 CET5103132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:38.079096079 CET5103132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:38.083889961 CET3258351031198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:39.644496918 CET3258351031198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:39.644609928 CET5103132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:39.644875050 CET5103132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:39.649651051 CET3258351031198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:40.649024010 CET5103232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:40.653856039 CET3258351032198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:40.653953075 CET5103232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:40.658440113 CET5103232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:40.663244009 CET3258351032198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:42.240096092 CET3258351032198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:42.242043018 CET5103232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:42.242381096 CET5103232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:42.247153044 CET3258351032198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:43.257934093 CET5103432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:43.262809038 CET3258351034198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:43.262937069 CET5103432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:43.268620014 CET5103432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:43.273425102 CET3258351034198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:44.830926895 CET3258351034198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:44.831036091 CET5103432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:44.831213951 CET5103432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:44.835932016 CET3258351034198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:45.836714029 CET5103532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:45.841465950 CET3258351035198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:45.841533899 CET5103532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:45.846410990 CET5103532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:45.851197004 CET3258351035198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:47.431201935 CET3258351035198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:47.431416988 CET5103532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:47.431574106 CET5103532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:47.436306000 CET3258351035198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:48.456868887 CET5103632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:48.461714983 CET3258351036198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:48.461785078 CET5103632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:48.480151892 CET5103632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:48.484967947 CET3258351036198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:50.034455061 CET3258351036198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:50.036186934 CET5103632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:50.036448002 CET5103632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:50.041229963 CET3258351036198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:51.039123058 CET5103732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:51.043979883 CET3258351037198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:51.044094086 CET5103732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:51.048805952 CET5103732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:51.053622007 CET3258351037198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:52.630951881 CET3258351037198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:52.636298895 CET5103732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:52.636392117 CET5103732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:52.645715952 CET3258351037198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:53.648574114 CET5103832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:53.658754110 CET3258351038198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:53.659028053 CET5103832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:53.662771940 CET5103832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:53.671632051 CET3258351038198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:55.258809090 CET3258351038198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:55.260360003 CET5103832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:55.260509968 CET5103832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:55.265255928 CET3258351038198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:56.273917913 CET5103932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:56.278772116 CET3258351039198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:56.278865099 CET5103932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:56.287631035 CET5103932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:56.292897940 CET3258351039198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:57.864670992 CET3258351039198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:57.864798069 CET5103932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:57.865115881 CET5103932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:57.869945049 CET3258351039198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:58.867403984 CET5104032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:58.872369051 CET3258351040198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:18:58.872560024 CET5104032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:58.876368999 CET5104032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:18:58.881169081 CET3258351040198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:00.441682100 CET3258351040198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:00.442481041 CET5104032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:00.442687035 CET5104032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:00.447484016 CET3258351040198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:01.446990013 CET5104132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:01.452085972 CET3258351041198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:01.452172041 CET5104132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:01.459105015 CET5104132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:01.464188099 CET3258351041198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:03.039845943 CET3258351041198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:03.040021896 CET5104132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:03.040287971 CET5104132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:03.047271967 CET3258351041198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:04.055166006 CET5104232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:04.060009003 CET3258351042198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:04.060082912 CET5104232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:04.063002110 CET5104232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:04.067823887 CET3258351042198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:05.647953987 CET3258351042198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:05.648557901 CET5104232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:05.648713112 CET5104232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:05.653633118 CET3258351042198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:06.617315054 CET5104332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:06.622184038 CET3258351043198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:06.622266054 CET5104332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:06.626333952 CET5104332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:06.631184101 CET3258351043198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:08.191284895 CET3258351043198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:08.191416979 CET5104332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:08.191601038 CET5104332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:08.196602106 CET3258351043198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:09.132927895 CET5104432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:09.137861967 CET3258351044198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:09.137954950 CET5104432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:09.141151905 CET5104432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:09.146209955 CET3258351044198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:10.722913980 CET3258351044198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:10.722973108 CET5104432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:10.723071098 CET5104432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:10.727864027 CET3258351044198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:11.633112907 CET5104532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:11.637999058 CET3258351045198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:11.638138056 CET5104532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:11.641503096 CET5104532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:11.646246910 CET3258351045198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:13.205265999 CET3258351045198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:13.208231926 CET5104532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:13.208456039 CET5104532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:13.213284969 CET3258351045198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:14.086055994 CET5104632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:14.090898991 CET3258351046198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:14.090982914 CET5104632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:14.094783068 CET5104632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:14.099632978 CET3258351046198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:15.660135984 CET3258351046198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:15.660276890 CET5104632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:15.660914898 CET5104632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:15.665719986 CET3258351046198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:16.508151054 CET5104732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:16.513216019 CET3258351047198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:16.513329983 CET5104732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:16.518224955 CET5104732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:16.523051023 CET3258351047198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:18.100218058 CET3258351047198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:18.100307941 CET5104732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:18.102422953 CET5104732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:18.107228994 CET3258351047198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:18.929863930 CET5104832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:18.934741020 CET3258351048198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:18.934823990 CET5104832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:18.940453053 CET5104832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:18.945314884 CET3258351048198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:20.504534006 CET3258351048198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:20.507258892 CET5104832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:20.507513046 CET5104832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:20.512289047 CET3258351048198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:21.304913998 CET5104932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:21.309842110 CET3258351049198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:21.309925079 CET5104932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:21.314970970 CET5104932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:21.319823027 CET3258351049198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:22.879195929 CET3258351049198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:22.879360914 CET5104932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:22.879584074 CET5104932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:22.884587049 CET3258351049198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:23.648627043 CET5105032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:23.653565884 CET3258351050198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:23.653645039 CET5105032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:23.657377005 CET5105032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:23.662219048 CET3258351050198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:25.242563963 CET3258351050198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:25.242635012 CET5105032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:25.242918968 CET5105032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:25.247912884 CET3258351050198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:25.992290020 CET5105132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:25.998764992 CET3258351051198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:25.998925924 CET5105132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:26.002233982 CET5105132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:26.007268906 CET3258351051198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:27.587703943 CET3258351051198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:27.587764978 CET5105132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:27.588023901 CET5105132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:27.592839956 CET3258351051198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:28.305093050 CET5105232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:28.310055971 CET3258351052198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:28.310592890 CET5105232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:28.313915014 CET5105232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:28.318695068 CET3258351052198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:29.878408909 CET3258351052198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:29.880259037 CET5105232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:29.880543947 CET5105232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:29.885355949 CET3258351052198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:30.570436954 CET5105332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:30.575329065 CET3258351053198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:30.580243111 CET5105332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:30.583581924 CET5105332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:30.590405941 CET3258351053198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:32.164123058 CET3258351053198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:32.164191008 CET5105332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:32.164392948 CET5105332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:32.169142962 CET3258351053198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:32.836220980 CET5105432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:32.841167927 CET3258351054198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:32.841279030 CET5105432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:32.844803095 CET5105432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:32.849637985 CET3258351054198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:34.444907904 CET3258351054198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:34.447164059 CET5105432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:34.447357893 CET5105432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:34.452168941 CET3258351054198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:35.101792097 CET5105532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:35.106758118 CET3258351055198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:35.106834888 CET5105532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:35.111457109 CET5105532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:35.116230011 CET3258351055198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:36.729351044 CET3258351055198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:36.729454041 CET5105532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:36.729582071 CET5105532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:36.734395027 CET3258351055198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:37.367432117 CET5105632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:37.372402906 CET3258351056198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:37.373256922 CET5105632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:37.376517057 CET5105632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:37.381369114 CET3258351056198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:39.112091064 CET3258351056198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:39.112201929 CET5105632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:39.112375021 CET5105632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:39.117283106 CET3258351056198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:39.726969004 CET5105732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:39.732157946 CET3258351057198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:39.732249975 CET5105732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:39.738174915 CET5105732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:39.743107080 CET3258351057198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:41.315440893 CET3258351057198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:41.316258907 CET5105732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:41.318335056 CET5105732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:41.323158979 CET3258351057198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:41.914253950 CET5105832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:41.919358969 CET3258351058198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:41.919467926 CET5105832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:41.922868013 CET5105832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:41.927798033 CET3258351058198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:43.488702059 CET3258351058198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:43.488815069 CET5105832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:43.488933086 CET5105832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:43.493808031 CET3258351058198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:44.125977993 CET5105932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:44.131099939 CET3258351059198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:44.131236076 CET5105932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:44.177969933 CET5105932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:44.182854891 CET3258351059198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:45.728204966 CET3258351059198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:45.730556965 CET5105932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:45.730731010 CET5105932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:45.735544920 CET3258351059198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:46.295064926 CET5106032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:46.300004005 CET3258351060198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:46.300081015 CET5106032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:46.303527117 CET5106032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:46.308401108 CET3258351060198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:47.882738113 CET3258351060198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:47.884274006 CET5106032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:47.884659052 CET5106032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:47.889489889 CET3258351060198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:48.414591074 CET5106132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:48.419477940 CET3258351061198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:48.419559956 CET5106132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:48.422887087 CET5106132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:48.427766085 CET3258351061198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:50.007795095 CET3258351061198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:50.008399010 CET5106132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:50.008532047 CET5106132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:50.013314009 CET3258351061198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:50.523833036 CET5106232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:50.529247046 CET3258351062198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:50.532301903 CET5106232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:50.535825014 CET5106232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:50.540694952 CET3258351062198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:52.098356962 CET3258351062198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:52.098472118 CET5106232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:52.098634005 CET5106232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:52.103466988 CET3258351062198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:52.602567911 CET5106332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:52.607434034 CET3258351063198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:52.607600927 CET5106332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:52.611584902 CET5106332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:52.616513014 CET3258351063198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:54.178242922 CET3258351063198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:54.180315018 CET5106332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:54.180555105 CET5106332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:54.185373068 CET3258351063198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:54.664201975 CET5106432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:54.669223070 CET3258351064198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:54.669327021 CET5106432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:54.672626019 CET5106432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:54.677467108 CET3258351064198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:56.239758015 CET3258351064198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:56.239825964 CET5106432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:56.240058899 CET5106432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:56.245023966 CET3258351064198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:56.711185932 CET5106532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:56.716217995 CET3258351065198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:56.716559887 CET5106532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:56.720041990 CET5106532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:56.724850893 CET3258351065198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:58.308877945 CET3258351065198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:58.309016943 CET5106532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:58.341133118 CET5106532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:58.345967054 CET3258351065198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:59.016942978 CET5106632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:59.320601940 CET3258351066198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:19:59.320698977 CET5106632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:59.367413044 CET5106632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:19:59.372490883 CET3258351066198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:00.897766113 CET3258351066198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:00.899852991 CET5106632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:00.899852991 CET5106632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:00.905683994 CET3258351066198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:01.631236076 CET5106732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:01.636164904 CET3258351067198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:01.636245966 CET5106732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:01.640017033 CET5106732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:01.644881010 CET3258351067198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:03.233912945 CET3258351067198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:03.233972073 CET5106732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:03.234184027 CET5106732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:03.238908052 CET3258351067198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:03.743865967 CET5106832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:04.053183079 CET3258351068198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:04.053560019 CET5106832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:04.060501099 CET5106832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:04.065323114 CET3258351068198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:05.632920027 CET3258351068198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:05.633014917 CET5106832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:05.633096933 CET5106832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:05.637856007 CET3258351068198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:06.039194107 CET5106932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:06.044056892 CET3258351069198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:06.044187069 CET5106932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:06.047672987 CET5106932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:06.052489042 CET3258351069198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:07.633934975 CET3258351069198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:07.634005070 CET5106932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:07.634119987 CET5106932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:07.638892889 CET3258351069198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:08.023608923 CET5107032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:08.028415918 CET3258351070198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:08.030596018 CET5107032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:08.034029007 CET5107032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:08.038815022 CET3258351070198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:09.618709087 CET3258351070198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:09.618838072 CET5107032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:09.619012117 CET5107032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:09.624017000 CET3258351070198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:10.064229965 CET5107132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:10.069257975 CET3258351071198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:10.069381952 CET5107132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:10.073072910 CET5107132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:10.077836037 CET3258351071198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:11.663628101 CET3258351071198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:11.663772106 CET5107132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:11.664102077 CET5107132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:11.668858051 CET3258351071198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:12.284446955 CET5107232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:12.289282084 CET3258351072198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:12.289371967 CET5107232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:12.301546097 CET5107232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:12.306324005 CET3258351072198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:13.867343903 CET3258351072198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:13.867436886 CET5107232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:13.867628098 CET5107232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:13.872356892 CET3258351072198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:14.226797104 CET5107332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:14.232336998 CET3258351073198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:14.232450008 CET5107332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:14.235806942 CET5107332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:14.240595102 CET3258351073198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:15.836604118 CET3258351073198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:15.836743116 CET5107332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:15.836853981 CET5107332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:15.841622114 CET3258351073198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:16.202224970 CET5107432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:16.207196951 CET3258351074198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:16.207293034 CET5107432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:16.211004972 CET5107432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:16.216301918 CET3258351074198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:17.786134958 CET3258351074198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:17.788320065 CET5107432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:17.788688898 CET5107432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:17.793464899 CET3258351074198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:18.323815107 CET5107532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:18.328793049 CET3258351075198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:18.328892946 CET5107532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:18.332336903 CET5107532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:18.337110996 CET3258351075198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:19.937110901 CET3258351075198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:19.937328100 CET5107532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:19.937328100 CET5107532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:19.942179918 CET3258351075198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:20.728859901 CET5107632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:20.733827114 CET3258351076198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:20.733930111 CET5107632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:20.739737988 CET5107632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:20.744579077 CET3258351076198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:22.321911097 CET3258351076198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:22.322010994 CET5107632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:22.322113991 CET5107632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:22.326853991 CET3258351076198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:22.652692080 CET5107732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:22.657728910 CET3258351077198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:22.657809019 CET5107732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:22.661288977 CET5107732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:22.666636944 CET3258351077198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:24.224746943 CET3258351077198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:24.224900007 CET5107732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:24.224984884 CET5107732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:24.229769945 CET3258351077198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:24.559739113 CET5107832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:24.564631939 CET3258351078198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:24.564784050 CET5107832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:24.568380117 CET5107832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:24.573153973 CET3258351078198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:26.149502039 CET3258351078198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:26.149638891 CET5107832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:26.149884939 CET5107832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:26.154891968 CET3258351078198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:26.533179998 CET5107932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:26.538029909 CET3258351079198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:26.538109064 CET5107932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:26.541881084 CET5107932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:26.546730995 CET3258351079198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:28.134613991 CET3258351079198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:28.134680986 CET5107932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:28.134871960 CET5107932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:28.139719009 CET3258351079198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:28.487663031 CET5108032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:28.492666006 CET3258351080198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:28.492741108 CET5108032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:28.499948025 CET5108032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:28.504770994 CET3258351080198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:30.087171078 CET3258351080198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:30.088531971 CET5108032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:30.088531971 CET5108032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:30.093451977 CET3258351080198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:30.440437078 CET5108132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:30.445348978 CET3258351081198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:30.448400974 CET5108132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:30.453105927 CET5108132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:30.457938910 CET3258351081198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:32.051522017 CET3258351081198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:32.054442883 CET5108132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:32.054666996 CET5108132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:32.059540033 CET3258351081198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:32.419668913 CET5108232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:32.424504042 CET3258351082198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:32.424586058 CET5108232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:32.427905083 CET5108232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:32.432661057 CET3258351082198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:33.989063978 CET3258351082198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:33.990434885 CET5108232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:33.990717888 CET5108232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:33.995516062 CET3258351082198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:34.301765919 CET5108332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:34.306701899 CET3258351083198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:34.308144093 CET5108332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:34.311547041 CET5108332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:34.316359043 CET3258351083198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:35.880785942 CET3258351083198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:35.884432077 CET5108332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:35.884526968 CET5108332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:35.889265060 CET3258351083198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:36.180375099 CET5108432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:36.185189962 CET3258351084198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:36.188119888 CET5108432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:36.191925049 CET5108432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:36.196705103 CET3258351084198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:37.756063938 CET3258351084198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:37.756135941 CET5108432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:37.756376982 CET5108432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:37.761437893 CET3258351084198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:38.295169115 CET5108532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:38.300271988 CET3258351085198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:38.300352097 CET5108532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:38.352144003 CET5108532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:38.357042074 CET3258351085198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:39.847419977 CET3258351085198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:39.847534895 CET5108532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:39.847760916 CET5108532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:39.852546930 CET3258351085198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:40.148838043 CET5108632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:40.153661013 CET3258351086198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:40.156418085 CET5108632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:40.160038948 CET5108632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:40.164798021 CET3258351086198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:41.739496946 CET3258351086198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:41.739563942 CET5108632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:41.739768028 CET5108632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:41.744610071 CET3258351086198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:42.048108101 CET5108732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:42.053643942 CET3258351087198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:42.053740978 CET5108732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:42.057394028 CET5108732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:42.063343048 CET3258351087198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:43.633241892 CET3258351087198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:43.633373976 CET5108732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:43.638654947 CET5108732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:43.643538952 CET3258351087198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:43.877804041 CET5108832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:43.882914066 CET3258351088198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:43.883003950 CET5108832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:43.890690088 CET5108832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:43.895589113 CET3258351088198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:45.458623886 CET3258351088198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:45.458946943 CET5108832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:45.459059000 CET5108832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:45.463922977 CET3258351088198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:45.768609047 CET5108932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:45.773514986 CET3258351089198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:45.773617029 CET5108932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:45.777339935 CET5108932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:45.782113075 CET3258351089198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:47.348543882 CET3258351089198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:47.352454901 CET5108932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:47.352494001 CET5108932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:47.357398033 CET3258351089198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:47.663275003 CET5109032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:47.668250084 CET3258351090198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:47.668340921 CET5109032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:47.672029972 CET5109032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:47.676949978 CET3258351090198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:49.242125034 CET3258351090198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:49.242202044 CET5109032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:49.242819071 CET5109032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:49.247639894 CET3258351090198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:49.699618101 CET5109132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:49.704608917 CET3258351091198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:49.704690933 CET5109132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:49.710076094 CET5109132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:49.714924097 CET3258351091198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:51.290853977 CET3258351091198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:51.290946960 CET5109132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:51.291107893 CET5109132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:51.295892954 CET3258351091198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:51.659852028 CET5109232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:51.664869070 CET3258351092198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:51.668395042 CET5109232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:51.732819080 CET5109232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:51.737767935 CET3258351092198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:53.254395008 CET3258351092198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:53.254487991 CET5109232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:53.254681110 CET5109232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:53.259550095 CET3258351092198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:53.583014965 CET5109332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:53.587944031 CET3258351093198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:53.588385105 CET5109332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:53.591804981 CET5109332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:53.596667051 CET3258351093198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:55.160079956 CET3258351093198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:55.160146952 CET5109332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:55.160283089 CET5109332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:55.165095091 CET3258351093198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:55.460160017 CET5109432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:55.465187073 CET3258351094198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:55.465262890 CET5109432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:55.468722105 CET5109432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:55.473511934 CET3258351094198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:57.073004961 CET3258351094198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:57.074620962 CET5109432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:57.074698925 CET5109432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:57.079530954 CET3258351094198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:57.819691896 CET5109532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:57.824659109 CET3258351095198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:57.824738979 CET5109532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:57.828197956 CET5109532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:57.833002090 CET3258351095198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:59.415292025 CET3258351095198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:59.415386915 CET5109532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:59.415575027 CET5109532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:59.420394897 CET3258351095198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:59.793819904 CET5109632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:59.798964024 CET3258351096198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:20:59.799041033 CET5109632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:59.806454897 CET5109632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:20:59.811281919 CET3258351096198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:01.382358074 CET3258351096198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:01.383486986 CET5109632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:01.383716106 CET5109632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:01.388612986 CET3258351096198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:01.724802017 CET5109732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:01.731455088 CET3258351097198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:01.733695984 CET5109732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:01.737292051 CET5109732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:01.742208958 CET3258351097198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:03.303818941 CET3258351097198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:03.303898096 CET5109732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:03.304071903 CET5109732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:03.308937073 CET3258351097198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:03.631381989 CET5109832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:03.638626099 CET3258351098198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:03.638761997 CET5109832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:03.642132044 CET5109832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:03.646979094 CET3258351098198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:05.232253075 CET3258351098198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:05.232450008 CET5109832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:05.232657909 CET5109832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:05.237471104 CET3258351098198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:05.566741943 CET5109932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:05.571933985 CET3258351099198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:05.572021961 CET5109932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:05.575655937 CET5109932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:05.580533028 CET3258351099198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:07.145296097 CET3258351099198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:07.148407936 CET5109932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:07.148535967 CET5109932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:07.153327942 CET3258351099198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:07.938157082 CET5110032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:07.943144083 CET3258351100198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:07.943226099 CET5110032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:07.947187901 CET5110032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:07.951958895 CET3258351100198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:09.529351950 CET3258351100198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:09.530565977 CET5110032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:09.530714989 CET5110032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:09.535576105 CET3258351100198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:09.857882977 CET5110132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:09.863131046 CET3258351101198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:09.865926027 CET5110132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:09.870182991 CET5110132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:09.875072002 CET3258351101198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:11.425791025 CET3258351101198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:11.425892115 CET5110132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:11.426075935 CET5110132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:11.431597948 CET3258351101198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:11.736571074 CET5110232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:11.741588116 CET3258351102198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:11.741724014 CET5110232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:11.745660067 CET5110232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:11.750488043 CET3258351102198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:13.339590073 CET3258351102198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:13.344412088 CET5110232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:13.351689100 CET5110232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:13.356625080 CET3258351102198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:13.492549896 CET5110332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:13.497709990 CET3258351103198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:13.497818947 CET5110332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:13.501363039 CET5110332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:13.506331921 CET3258351103198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:15.084498882 CET3258351103198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:15.084578037 CET5110332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:15.084804058 CET5110332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:15.089690924 CET3258351103198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:15.438611984 CET5110432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:15.443675995 CET3258351104198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:15.444428921 CET5110432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:15.448453903 CET5110432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:15.453330040 CET3258351104198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:17.045701981 CET3258351104198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:17.046674013 CET5110432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:17.047194958 CET5110432583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:17.052012920 CET3258351104198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:17.353919983 CET5110532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:17.359013081 CET3258351105198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:17.362046957 CET5110532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:17.365967989 CET5110532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:17.370851040 CET3258351105198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:18.927179098 CET3258351105198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:18.927294016 CET5110532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:18.927406073 CET5110532583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:18.932178974 CET3258351105198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:19.342950106 CET5110632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:19.348002911 CET3258351106198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:19.348078966 CET5110632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:19.352113962 CET5110632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:19.356940985 CET3258351106198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:20.934473991 CET3258351106198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:20.934561968 CET5110632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:20.934756041 CET5110632583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:20.939569950 CET3258351106198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:21.564985991 CET5110732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:21.570051908 CET3258351107198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:21.570137978 CET5110732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:21.575146914 CET5110732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:21.580024958 CET3258351107198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:23.151321888 CET3258351107198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:23.152453899 CET5110732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:23.152678967 CET5110732583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:23.157500029 CET3258351107198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:23.535435915 CET5110832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:23.540544033 CET3258351108198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:23.540762901 CET5110832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:23.544347048 CET5110832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:23.549323082 CET3258351108198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:25.378868103 CET3258351108198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:25.378957987 CET5110832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:25.379163980 CET5110832583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:25.384999990 CET3258351108198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:25.744100094 CET5110932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:25.749838114 CET3258351109198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:25.749957085 CET5110932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:25.753931999 CET5110932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:25.760987997 CET3258351109198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:27.338865995 CET3258351109198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:27.338960886 CET5110932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:27.339238882 CET5110932583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:27.344101906 CET3258351109198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:27.673096895 CET5111032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:27.678164959 CET3258351110198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:27.679425955 CET5111032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:27.683056116 CET5111032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:27.688005924 CET3258351110198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:29.259038925 CET3258351110198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:29.259613991 CET5111032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:29.259782076 CET5111032583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:29.264666080 CET3258351110198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:29.367327929 CET5111132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:29.372266054 CET3258351111198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:29.372360945 CET5111132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:29.376194954 CET5111132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:29.381223917 CET3258351111198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:30.957855940 CET3258351111198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:30.958093882 CET5111132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:30.958093882 CET5111132583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:30.962901115 CET3258351111198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:32.103331089 CET5111232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:32.108500957 CET3258351112198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:32.108720064 CET5111232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:32.112052917 CET5111232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:32.116933107 CET3258351112198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:33.693654060 CET3258351112198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:33.696502924 CET5111232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:33.696816921 CET5111232583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:33.701617002 CET3258351112198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:34.006277084 CET5111332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:34.011275053 CET3258351113198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:34.012449980 CET5111332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:34.015897989 CET5111332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:34.020782948 CET3258351113198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:35.588937044 CET3258351113198.23.227.212192.168.2.5
                                        Jan 11, 2025 07:21:35.590795040 CET5111332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:35.590795040 CET5111332583192.168.2.5198.23.227.212
                                        Jan 11, 2025 07:21:35.595757008 CET3258351113198.23.227.212192.168.2.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 11, 2025 07:17:40.558727026 CET53596601.1.1.1192.168.2.5

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:01:17:26
                                        Start date:11/01/2025
                                        Path:C:\Users\user\Desktop\Wk731bq71c.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Wk731bq71c.exe"
                                        Imagebase:0x400000
                                        File size:526'848 bytes
                                        MD5 hash:78C37A72C91559ED73B7CBEC99534BFC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2390395586.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2390598572.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000003.2089950157.0000000002200000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low
                                        Has exited:true

                                        Target ID:4
                                        Start time:01:17:29
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 940
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:01:17:31
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 964
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:01:17:32
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 952
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:01:17:33
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1096
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:01:17:34
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1124
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:14
                                        Start time:01:17:35
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 952
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:16
                                        Start time:01:17:36
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 1112
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:17
                                        Start time:01:17:37
                                        Start date:11/01/2025
                                        Path:C:\Users\user\AppData\Roaming\xenor\yavascript.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                                        Imagebase:0x400000
                                        File size:526'848 bytes
                                        MD5 hash:78C37A72C91559ED73B7CBEC99534BFC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000011.00000002.4552749576.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.4553045249.00000000007E4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000011.00000002.4552510524.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000011.00000003.2201561120.00000000020D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        Antivirus matches:
                                        • Detection: 74%, ReversingLabs
                                        • Detection: 53%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:false

                                        Target ID:19
                                        Start time:01:17:37
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 916
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:20
                                        Start time:01:17:38
                                        Start date:11/01/2025
                                        Path:C:\Users\user\AppData\Roaming\xenor\yavascript.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                                        Imagebase:0x400000
                                        File size:526'848 bytes
                                        MD5 hash:78C37A72C91559ED73B7CBEC99534BFC
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.2401143387.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000014.00000002.2401231808.0000000000680000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000014.00000002.2400928659.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000014.00000002.2401350446.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000014.00000003.2213288481.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low
                                        Has exited:true

                                        Target ID:22
                                        Start time:01:17:38
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 636
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:26
                                        Start time:01:17:40
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 676
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:01:17:40
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 532
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:29
                                        Start time:01:17:41
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 708
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:32
                                        Start time:01:17:42
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 732
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:34
                                        Start time:01:17:44
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 748
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:36
                                        Start time:01:17:45
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 796
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:38
                                        Start time:01:17:46
                                        Start date:11/01/2025
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 792
                                        Imagebase:0x4b0000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:39
                                        Start time:01:17:47
                                        Start date:11/01/2025
                                        Path:C:\Users\user\AppData\Roaming\xenor\yavascript.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\xenor\yavascript.exe"
                                        Imagebase:0x400000
                                        File size:526'848 bytes
                                        MD5 hash:78C37A72C91559ED73B7CBEC99534BFC
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000027.00000002.2365077997.000000000079A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000027.00000002.2364925163.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000027.00000002.2364803401.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000027.00000003.2297345823.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000027.00000002.2365175390.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:1.2%
                                          Dynamic/Decrypted Code Coverage:19.9%
                                          Signature Coverage:32.1%
                                          Total number of Nodes:703
                                          Total number of Limit Nodes:22
                                          execution_graph 87956 218003c 87957 2180049 87956->87957 87971 2180e0f SetErrorMode SetErrorMode 87957->87971 87962 2180265 87963 21802ce VirtualProtect 87962->87963 87965 218030b 87963->87965 87964 2180439 VirtualFree 87969 21804be 87964->87969 87970 21805f4 LoadLibraryA 87964->87970 87965->87964 87966 21804e3 LoadLibraryA 87966->87969 87968 21808c7 87969->87966 87969->87970 87970->87968 87972 2180223 87971->87972 87973 2180d90 87972->87973 87974 2180dad 87973->87974 87975 2180dbb GetPEB 87974->87975 87976 2180238 VirtualAlloc 87974->87976 87975->87976 87976->87962 87977 5b0000 87980 5b0006 87977->87980 87981 5b0015 87980->87981 87984 5b07a6 87981->87984 87986 5b07c1 87984->87986 87985 5b07ca CreateToolhelp32Snapshot 87985->87986 87987 5b07e6 Module32First 87985->87987 87986->87985 87986->87987 87988 5b0005 87987->87988 87989 5b07f5 87987->87989 87991 5b0465 87989->87991 87992 5b0490 87991->87992 87993 5b04d9 87992->87993 87994 5b04a1 VirtualAlloc 87992->87994 87993->87993 87994->87993 87995 43a998 87998 43a9a4 _swprintf CallCatchBlock 87995->87998 87996 43a9b2 88011 445354 20 API calls __dosmaperr 87996->88011 87998->87996 87999 43a9dc 87998->87999 88006 444acc RtlEnterCriticalSection 87999->88006 88001 43a9b7 __fread_nolock __cftoe 88002 43a9e7 88007 43aa88 88002->88007 88006->88002 88009 43aa96 88007->88009 88008 43a9f2 88012 43aa0f RtlLeaveCriticalSection std::_Lockit::~_Lockit 88008->88012 88009->88008 88013 448416 36 API calls 2 library calls 88009->88013 88011->88001 88012->88001 88013->88009 88014 402bcc 88015 402bd7 88014->88015 88016 402bdf 88014->88016 88032 403315 28 API calls _Deallocate 88015->88032 88018 402beb 88016->88018 88022 4015d3 88016->88022 88019 402bdd 88024 43360d 88022->88024 88025 402be9 88024->88025 88028 43362e std::_Facet_Register 88024->88028 88033 43a88c 88024->88033 88040 442200 7 API calls 2 library calls 88024->88040 88027 433dec std::_Facet_Register 88042 437bd7 RaiseException 88027->88042 88028->88027 88041 437bd7 RaiseException 88028->88041 88031 433e09 88032->88019 88038 446aff _strftime 88033->88038 88034 446b3d 88044 445354 20 API calls __dosmaperr 88034->88044 88036 446b28 RtlAllocateHeap 88037 446b3b 88036->88037 88036->88038 88037->88024 88038->88034 88038->88036 88043 442200 7 API calls 2 library calls 88038->88043 88040->88024 88041->88027 88042->88031 88043->88038 88044->88037 88045 4339be 88046 4339ca CallCatchBlock 88045->88046 88077 4336b3 88046->88077 88048 4339d1 88049 433b24 88048->88049 88053 4339fb 88048->88053 88368 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 88049->88368 88051 433b2b 88369 4426be 28 API calls _Atexit 88051->88369 88064 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 88053->88064 88362 4434d1 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 88053->88362 88054 433b31 88370 442670 28 API calls _Atexit 88054->88370 88057 433a14 88059 433a1a 88057->88059 88363 443475 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 88057->88363 88058 433b39 88061 433a9b 88088 433c5e 88061->88088 88064->88061 88364 43edf4 35 API calls 4 library calls 88064->88364 88071 433abd 88071->88051 88072 433ac1 88071->88072 88073 433aca 88072->88073 88366 442661 28 API calls _Atexit 88072->88366 88367 433842 13 API calls 2 library calls 88073->88367 88076 433ad2 88076->88059 88078 4336bc 88077->88078 88371 433e0a IsProcessorFeaturePresent 88078->88371 88080 4336c8 88372 4379ee 10 API calls 3 library calls 88080->88372 88082 4336cd 88083 4336d1 88082->88083 88373 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 88082->88373 88083->88048 88085 4336da 88086 4336e8 88085->88086 88374 437a17 8 API calls 3 library calls 88085->88374 88086->88048 88375 436050 88088->88375 88090 433c71 GetStartupInfoW 88091 433aa1 88090->88091 88092 443422 88091->88092 88376 44ddc9 88092->88376 88094 44342b 88095 433aaa 88094->88095 88380 44e0d3 35 API calls 88094->88380 88097 40d767 88095->88097 88382 41bce3 LoadLibraryA GetProcAddress 88097->88382 88099 40d783 GetModuleFileNameW 88387 40e168 88099->88387 88101 40d79f 88402 401fbd 88101->88402 88104 401fbd 28 API calls 88105 40d7bd 88104->88105 88406 41afc3 88105->88406 88109 40d7cf 88431 401d8c 88109->88431 88111 40d7d8 88112 40d835 88111->88112 88113 40d7eb 88111->88113 88437 401d64 88112->88437 88624 40e986 111 API calls 88113->88624 88116 40d845 88119 401d64 22 API calls 88116->88119 88117 40d7fd 88118 401d64 22 API calls 88117->88118 88121 40d809 88118->88121 88120 40d864 88119->88120 88442 404cbf 88120->88442 88625 40e937 65 API calls 88121->88625 88123 40d873 88446 405ce6 88123->88446 88126 40d824 88626 40e155 65 API calls 88126->88626 88127 40d87f 88449 401eef 88127->88449 88130 40d88b 88453 401eea 88130->88453 88132 40d894 88134 401eea 11 API calls 88132->88134 88133 401eea 11 API calls 88135 40dc9f 88133->88135 88136 40d89d 88134->88136 88365 433c94 GetModuleHandleW 88135->88365 88137 401d64 22 API calls 88136->88137 88138 40d8a6 88137->88138 88457 401ebd 88138->88457 88140 40d8b1 88141 401d64 22 API calls 88140->88141 88142 40d8ca 88141->88142 88143 401d64 22 API calls 88142->88143 88145 40d8e5 88143->88145 88144 40d946 88147 401d64 22 API calls 88144->88147 88162 40e134 88144->88162 88145->88144 88627 4085b4 28 API calls 88145->88627 88152 40d95d 88147->88152 88148 40d912 88149 401eef 11 API calls 88148->88149 88150 40d91e 88149->88150 88153 401eea 11 API calls 88150->88153 88151 40d9a4 88461 40bed7 88151->88461 88152->88151 88157 4124b7 3 API calls 88152->88157 88154 40d927 88153->88154 88628 4124b7 RegOpenKeyExA 88154->88628 88156 40d9aa 88158 40d82d 88156->88158 88464 41a463 88156->88464 88163 40d988 88157->88163 88158->88133 88161 40d9c5 88164 40da18 88161->88164 88481 40697b 88161->88481 88662 412902 31 API calls 88162->88662 88163->88151 88631 412902 31 API calls 88163->88631 88166 401d64 22 API calls 88164->88166 88169 40da21 88166->88169 88178 40da32 88169->88178 88179 40da2d 88169->88179 88171 40e14a 88663 4112b5 65 API calls ___scrt_fastfail 88171->88663 88173 40d9e4 88632 40699d 31 API calls 88173->88632 88174 40d9ee 88176 401d64 22 API calls 88174->88176 88186 40d9f7 88176->88186 88183 401d64 22 API calls 88178->88183 88635 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 88179->88635 88180 40d9e9 88633 4064d0 97 API calls 88180->88633 88184 40da3b 88183->88184 88485 41ae08 88184->88485 88186->88164 88189 40da13 88186->88189 88187 40da46 88489 401e18 88187->88489 88634 4064d0 97 API calls 88189->88634 88190 40da51 88493 401e13 88190->88493 88193 40da5a 88194 401d64 22 API calls 88193->88194 88195 40da63 88194->88195 88196 401d64 22 API calls 88195->88196 88197 40da7d 88196->88197 88198 401d64 22 API calls 88197->88198 88199 40da97 88198->88199 88200 401d64 22 API calls 88199->88200 88202 40dab0 88200->88202 88201 40db1d 88203 40db2c 88201->88203 88209 40dcaa ___scrt_fastfail 88201->88209 88202->88201 88204 401d64 22 API calls 88202->88204 88205 401d64 22 API calls 88203->88205 88212 40dbb1 88203->88212 88207 40dac5 _wcslen 88204->88207 88206 40db3e 88205->88206 88208 401d64 22 API calls 88206->88208 88207->88201 88210 401d64 22 API calls 88207->88210 88211 40db50 88208->88211 88638 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 88209->88638 88213 40dae0 88210->88213 88215 401d64 22 API calls 88211->88215 88233 40dbac ___scrt_fastfail 88212->88233 88216 401d64 22 API calls 88213->88216 88217 40db62 88215->88217 88218 40daf5 88216->88218 88221 401d64 22 API calls 88217->88221 88497 40c89e 88218->88497 88219 40dcef 88220 401d64 22 API calls 88219->88220 88223 40dd16 88220->88223 88222 40db8b 88221->88222 88227 401d64 22 API calls 88222->88227 88639 401f66 88223->88639 88226 401e18 11 API calls 88229 40db14 88226->88229 88230 40db9c 88227->88230 88232 401e13 11 API calls 88229->88232 88554 40bc67 88230->88554 88231 40dd25 88643 4126d2 14 API calls 88231->88643 88232->88201 88233->88212 88636 4128a2 31 API calls 88233->88636 88237 40dc45 ctype 88241 401d64 22 API calls 88237->88241 88238 40dd3b 88239 401d64 22 API calls 88238->88239 88240 40dd47 88239->88240 88644 43a5e7 39 API calls _strftime 88240->88644 88244 40dc5c 88241->88244 88243 40dd54 88245 40dd81 88243->88245 88645 41beb0 87 API calls ___scrt_fastfail 88243->88645 88244->88219 88246 401d64 22 API calls 88244->88246 88250 401f66 28 API calls 88245->88250 88248 40dc7e 88246->88248 88251 41ae08 29 API calls 88248->88251 88249 40dd65 CreateThread 88249->88245 88830 41c96f 10 API calls 88249->88830 88252 40dd96 88250->88252 88253 40dc87 88251->88253 88254 401f66 28 API calls 88252->88254 88637 40e219 112 API calls 88253->88637 88256 40dda5 88254->88256 88646 41a686 79 API calls 88256->88646 88257 40dc8c 88257->88219 88258 40dc93 88257->88258 88258->88158 88260 40ddaa 88261 401d64 22 API calls 88260->88261 88262 40ddb6 88261->88262 88263 401d64 22 API calls 88262->88263 88264 40ddcb 88263->88264 88265 401d64 22 API calls 88264->88265 88266 40ddeb 88265->88266 88647 43a5e7 39 API calls _strftime 88266->88647 88268 40ddf8 88269 401d64 22 API calls 88268->88269 88270 40de03 88269->88270 88271 401d64 22 API calls 88270->88271 88272 40de14 88271->88272 88273 401d64 22 API calls 88272->88273 88274 40de29 88273->88274 88275 401d64 22 API calls 88274->88275 88276 40de3a 88275->88276 88277 40de41 StrToIntA 88276->88277 88648 409517 145 API calls _wcslen 88277->88648 88279 40de53 88280 401d64 22 API calls 88279->88280 88282 40de5c 88280->88282 88281 40dea1 88285 401d64 22 API calls 88281->88285 88282->88281 88649 43360d 22 API calls 3 library calls 88282->88649 88284 40de71 88286 401d64 22 API calls 88284->88286 88289 40deb1 88285->88289 88287 40de84 88286->88287 88290 40de8b CreateThread 88287->88290 88288 40def9 88292 401d64 22 API calls 88288->88292 88289->88288 88650 43360d 22 API calls 3 library calls 88289->88650 88290->88281 88826 419128 110 API calls 2 library calls 88290->88826 88297 40df02 88292->88297 88293 40dec6 88294 401d64 22 API calls 88293->88294 88295 40ded8 88294->88295 88298 40dedf CreateThread 88295->88298 88296 40df6c 88299 401d64 22 API calls 88296->88299 88297->88296 88300 401d64 22 API calls 88297->88300 88298->88288 88831 419128 110 API calls 2 library calls 88298->88831 88302 40df75 88299->88302 88301 40df1e 88300->88301 88304 401d64 22 API calls 88301->88304 88303 40dfba 88302->88303 88305 401d64 22 API calls 88302->88305 88654 41a7a2 30 API calls 88303->88654 88306 40df33 88304->88306 88309 40df8a 88305->88309 88651 40c854 33 API calls 88306->88651 88308 40dfc3 88310 401e18 11 API calls 88308->88310 88314 401d64 22 API calls 88309->88314 88311 40dfce 88310->88311 88313 401e13 11 API calls 88311->88313 88316 40dfd7 CreateThread 88313->88316 88317 40df9f 88314->88317 88315 40df46 88318 401e18 11 API calls 88315->88318 88321 40e004 88316->88321 88322 40dff8 CreateThread 88316->88322 88832 40e54f 83 API calls 88316->88832 88652 43a5e7 39 API calls _strftime 88317->88652 88320 40df52 88318->88320 88323 401e13 11 API calls 88320->88323 88324 40e019 88321->88324 88325 40e00d CreateThread 88321->88325 88322->88321 88827 410f36 140 API calls 88322->88827 88327 40df5b CreateThread 88323->88327 88329 40e073 88324->88329 88331 401f66 28 API calls 88324->88331 88325->88324 88828 411524 38 API calls ___scrt_fastfail 88325->88828 88327->88296 88829 40196b 49 API calls _strftime 88327->88829 88328 40dfac 88653 40b95c 7 API calls 88328->88653 88657 41246e RegOpenKeyExA RegQueryValueExA RegCloseKey 88329->88657 88332 40e046 88331->88332 88655 404c9e 28 API calls 88332->88655 88335 40e053 88337 401f66 28 API calls 88335->88337 88336 40e08b 88338 40e12a 88336->88338 88341 41ae08 29 API calls 88336->88341 88339 40e062 88337->88339 88660 40cbac 27 API calls 88338->88660 88656 41a686 79 API calls 88339->88656 88342 40e0a4 88341->88342 88658 412584 31 API calls 88342->88658 88344 40e12f 88661 413fd4 171 API calls _strftime 88344->88661 88345 40e067 88347 401eea 11 API calls 88345->88347 88347->88329 88349 40e0ba 88350 401e13 11 API calls 88349->88350 88353 40e0c5 88350->88353 88351 40e0ed DeleteFileW 88352 40e0f4 88351->88352 88351->88353 88355 41ae08 29 API calls 88352->88355 88353->88351 88353->88352 88354 40e0db Sleep 88353->88354 88354->88353 88356 40e104 88355->88356 88659 41297a RegOpenKeyExW RegDeleteValueW 88356->88659 88358 40e117 88359 401e13 11 API calls 88358->88359 88360 40e121 88359->88360 88361 401e13 11 API calls 88360->88361 88361->88338 88362->88057 88363->88064 88364->88061 88365->88071 88366->88073 88367->88076 88368->88051 88369->88054 88370->88058 88371->88080 88372->88082 88373->88085 88374->88083 88375->88090 88377 44dddb 88376->88377 88378 44ddd2 88376->88378 88377->88094 88381 44dcc8 48 API calls 5 library calls 88378->88381 88380->88094 88381->88377 88383 41bd22 LoadLibraryA GetProcAddress 88382->88383 88384 41bd12 GetModuleHandleA GetProcAddress 88382->88384 88385 41bd4b 32 API calls 88383->88385 88386 41bd3b LoadLibraryA GetProcAddress 88383->88386 88384->88383 88385->88099 88386->88385 88664 41a63f FindResourceA 88387->88664 88390 43a88c _Yarn 21 API calls 88391 40e192 ctype 88390->88391 88667 401f86 88391->88667 88394 401eef 11 API calls 88395 40e1b8 88394->88395 88396 401eea 11 API calls 88395->88396 88397 40e1c1 88396->88397 88398 43a88c _Yarn 21 API calls 88397->88398 88399 40e1d2 ctype 88398->88399 88671 406052 88399->88671 88401 40e205 88401->88101 88403 401fcc 88402->88403 88679 402501 88403->88679 88405 401fea 88405->88104 88426 41afd6 88406->88426 88407 41b046 88408 401eea 11 API calls 88407->88408 88409 41b078 88408->88409 88410 401eea 11 API calls 88409->88410 88412 41b080 88410->88412 88411 41b048 88686 403b60 28 API calls 88411->88686 88415 401eea 11 API calls 88412->88415 88417 40d7c6 88415->88417 88416 41b054 88418 401eef 11 API calls 88416->88418 88427 40e8bd 88417->88427 88420 41b05d 88418->88420 88419 401eef 11 API calls 88419->88426 88421 401eea 11 API calls 88420->88421 88423 41b065 88421->88423 88422 401eea 11 API calls 88422->88426 88687 41bfa9 28 API calls 88423->88687 88426->88407 88426->88411 88426->88419 88426->88422 88684 403b60 28 API calls 88426->88684 88685 41bfa9 28 API calls 88426->88685 88428 40e8ca 88427->88428 88430 40e8da 88428->88430 88688 40200a 11 API calls 88428->88688 88430->88109 88432 40200a 88431->88432 88436 40203a 88432->88436 88689 402654 11 API calls 88432->88689 88434 40202b 88690 4026ba 11 API calls _Deallocate 88434->88690 88436->88111 88438 401d6c 88437->88438 88439 401d74 88438->88439 88691 401fff 22 API calls 88438->88691 88439->88116 88443 404ccb 88442->88443 88692 402e78 88443->88692 88445 404cee 88445->88123 88701 404bc4 88446->88701 88448 405cf4 88448->88127 88450 401efe 88449->88450 88452 401f0a 88450->88452 88710 4021b9 11 API calls 88450->88710 88452->88130 88454 4021b9 88453->88454 88455 4021e8 88454->88455 88711 40262e 11 API calls _Deallocate 88454->88711 88455->88132 88459 401ec9 88457->88459 88458 401ee4 88458->88140 88459->88458 88460 402325 28 API calls 88459->88460 88460->88458 88712 401e8f 88461->88712 88463 40bee1 CreateMutexA GetLastError 88463->88156 88714 41b15b 88464->88714 88466 41a471 88718 412513 RegOpenKeyExA 88466->88718 88469 401eef 11 API calls 88470 41a49f 88469->88470 88471 401eea 11 API calls 88470->88471 88472 41a4a7 88471->88472 88473 41a4fa 88472->88473 88474 412513 31 API calls 88472->88474 88473->88161 88475 41a4cd 88474->88475 88476 41a4d8 StrToIntA 88475->88476 88477 41a4ef 88476->88477 88478 41a4e6 88476->88478 88480 401eea 11 API calls 88477->88480 88723 41c102 22 API calls 88478->88723 88480->88473 88482 40698f 88481->88482 88483 4124b7 3 API calls 88482->88483 88484 406996 88483->88484 88484->88173 88484->88174 88486 41ae1c 88485->88486 88724 40b027 88486->88724 88488 41ae24 88488->88187 88490 401e27 88489->88490 88492 401e33 88490->88492 88737 402121 11 API calls 88490->88737 88492->88190 88494 402121 88493->88494 88495 402150 88494->88495 88738 402718 11 API calls _Deallocate 88494->88738 88495->88193 88498 40c8ba 88497->88498 88499 40c8da 88498->88499 88500 40c90f 88498->88500 88502 40c8d0 88498->88502 88743 41a74b 29 API calls 88499->88743 88503 41b15b 2 API calls 88500->88503 88501 40ca03 GetLongPathNameW 88739 403b40 88501->88739 88502->88501 88506 40c914 88503->88506 88509 40c918 88506->88509 88510 40c96a 88506->88510 88507 40c8e3 88511 401e18 11 API calls 88507->88511 88514 403b40 28 API calls 88509->88514 88513 403b40 28 API calls 88510->88513 88549 40c8ed 88511->88549 88512 403b40 28 API calls 88515 40ca27 88512->88515 88516 40c978 88513->88516 88517 40c926 88514->88517 88746 40cc37 28 API calls 88515->88746 88522 403b40 28 API calls 88516->88522 88523 403b40 28 API calls 88517->88523 88518 401e13 11 API calls 88518->88502 88520 40ca3a 88747 402860 28 API calls 88520->88747 88525 40c98e 88522->88525 88526 40c93c 88523->88526 88524 40ca45 88748 402860 28 API calls 88524->88748 88745 402860 28 API calls 88525->88745 88744 402860 28 API calls 88526->88744 88530 40c999 88533 401e18 11 API calls 88530->88533 88531 40c947 88534 401e18 11 API calls 88531->88534 88532 40ca4f 88535 401e13 11 API calls 88532->88535 88537 40c9a4 88533->88537 88538 40c952 88534->88538 88536 40ca59 88535->88536 88539 401e13 11 API calls 88536->88539 88540 401e13 11 API calls 88537->88540 88541 401e13 11 API calls 88538->88541 88542 40ca62 88539->88542 88543 40c9ad 88540->88543 88544 40c95b 88541->88544 88545 401e13 11 API calls 88542->88545 88546 401e13 11 API calls 88543->88546 88547 401e13 11 API calls 88544->88547 88548 40ca6b 88545->88548 88546->88549 88547->88549 88550 401e13 11 API calls 88548->88550 88549->88518 88551 40ca74 88550->88551 88552 401e13 11 API calls 88551->88552 88553 40ca7d 88552->88553 88553->88226 88555 40bc7a _wcslen 88554->88555 88556 40bc84 88555->88556 88557 40bcce 88555->88557 88559 40bc8d CreateDirectoryW 88556->88559 88558 40c89e 32 API calls 88557->88558 88560 40bce0 88558->88560 88750 40856b 88559->88750 88562 401e18 11 API calls 88560->88562 88564 40bccc 88562->88564 88563 40bca9 88784 4028cf 88563->88784 88566 401e13 11 API calls 88564->88566 88570 40bcf7 88566->88570 88567 40bcb5 88568 401e18 11 API calls 88567->88568 88569 40bcc3 88568->88569 88571 401e13 11 API calls 88569->88571 88572 40bd10 88570->88572 88573 40bd2d 88570->88573 88571->88564 88575 40bb7b 31 API calls 88572->88575 88574 40bd36 CopyFileW 88573->88574 88576 40be07 88574->88576 88577 40bd48 _wcslen 88574->88577 88609 40bd21 88575->88609 88756 40bb7b 88576->88756 88577->88576 88579 40bd64 88577->88579 88580 40bdb7 88577->88580 88582 40c89e 32 API calls 88579->88582 88583 40c89e 32 API calls 88580->88583 88587 40bd6a 88582->88587 88586 40bdbd 88583->88586 88584 40be21 88591 40be2a SetFileAttributesW 88584->88591 88585 40be4d 88588 40be95 CloseHandle 88585->88588 88593 403b40 28 API calls 88585->88593 88590 401e18 11 API calls 88586->88590 88589 401e18 11 API calls 88587->88589 88782 401e07 88588->88782 88596 40bd76 88589->88596 88595 40bdb1 88590->88595 88608 40be39 _wcslen 88591->88608 88594 40be63 88593->88594 88598 41ae08 29 API calls 88594->88598 88603 401e13 11 API calls 88595->88603 88599 401e13 11 API calls 88596->88599 88597 40beb1 ShellExecuteW 88600 40bec4 88597->88600 88601 40bece ExitProcess 88597->88601 88602 40be76 88598->88602 88604 40bd7f 88599->88604 88605 40bed7 CreateMutexA GetLastError 88600->88605 88787 412774 RegCreateKeyW 88602->88787 88607 40bdcf 88603->88607 88606 40856b 28 API calls 88604->88606 88605->88609 88610 40bd93 88606->88610 88614 40bddb CreateDirectoryW 88607->88614 88608->88585 88611 40be4a SetFileAttributesW 88608->88611 88609->88233 88613 4028cf 28 API calls 88610->88613 88611->88585 88617 40bd9f 88613->88617 88616 401e07 88614->88616 88620 40bdeb CopyFileW 88616->88620 88619 401e18 11 API calls 88617->88619 88618 401e13 11 API calls 88618->88588 88622 40bda8 88619->88622 88620->88576 88621 40bdf8 88620->88621 88621->88609 88623 401e13 11 API calls 88622->88623 88623->88595 88624->88117 88625->88126 88627->88148 88629 4124e1 RegQueryValueExA RegCloseKey 88628->88629 88630 41250b 88628->88630 88629->88630 88630->88144 88631->88151 88632->88180 88633->88174 88634->88164 88635->88178 88636->88237 88637->88257 88638->88219 88640 401f6e 88639->88640 88821 402301 88640->88821 88643->88238 88644->88243 88645->88249 88646->88260 88647->88268 88648->88279 88649->88284 88650->88293 88651->88315 88652->88328 88653->88303 88654->88308 88655->88335 88656->88345 88657->88336 88658->88349 88659->88358 88660->88344 88825 419e89 106 API calls 88661->88825 88662->88171 88665 40e183 88664->88665 88666 41a65c LoadResource LockResource SizeofResource 88664->88666 88665->88390 88666->88665 88668 401f8e 88667->88668 88674 402325 88668->88674 88670 401fa4 88670->88394 88672 401f86 28 API calls 88671->88672 88673 406066 88672->88673 88673->88401 88675 40232f 88674->88675 88677 40233a 88675->88677 88678 40294a 28 API calls 88675->88678 88677->88670 88678->88677 88680 40250d 88679->88680 88682 40252b 88680->88682 88683 40261a 28 API calls 88680->88683 88682->88405 88683->88682 88684->88426 88685->88426 88686->88416 88687->88407 88688->88430 88689->88434 88690->88436 88694 402e85 88692->88694 88693 402ea9 88693->88445 88694->88693 88695 402e98 88694->88695 88697 402eae 88694->88697 88699 403445 28 API calls 88695->88699 88697->88693 88700 40225b 11 API calls 88697->88700 88699->88693 88700->88693 88702 404bd0 88701->88702 88705 40245c 88702->88705 88704 404be4 88704->88448 88706 402469 88705->88706 88708 402478 88706->88708 88709 402ad3 28 API calls 88706->88709 88708->88704 88709->88708 88710->88452 88711->88455 88713 401e94 88712->88713 88715 41b183 88714->88715 88716 41b168 GetCurrentProcess IsWow64Process 88714->88716 88715->88466 88716->88715 88717 41b17f 88716->88717 88717->88466 88719 412541 RegQueryValueExA RegCloseKey 88718->88719 88720 412569 88718->88720 88719->88720 88721 401f66 28 API calls 88720->88721 88722 41257e 88721->88722 88722->88469 88723->88477 88725 40b02f 88724->88725 88728 40b04b 88725->88728 88727 40b045 88727->88488 88729 40b055 88728->88729 88730 40b060 88729->88730 88731 40b093 88729->88731 88735 408556 EntryPoint 88730->88735 88736 40b138 29 API calls 88731->88736 88734 40b078 88734->88727 88735->88734 88736->88734 88737->88492 88738->88495 88740 403b48 88739->88740 88749 403b7a 28 API calls 88740->88749 88742 403b5a 88742->88512 88743->88507 88744->88531 88745->88530 88746->88520 88747->88524 88748->88532 88749->88742 88751 408577 88750->88751 88793 402ca8 88751->88793 88755 4085a3 88755->88563 88757 40bba1 88756->88757 88758 40bbdd 88756->88758 88811 40b0dd 88757->88811 88759 40bc1e 88758->88759 88761 40b0dd 28 API calls 88758->88761 88762 40bc5f 88759->88762 88765 40b0dd 28 API calls 88759->88765 88764 40bbf4 88761->88764 88762->88584 88762->88585 88767 4028cf 28 API calls 88764->88767 88768 40bc35 88765->88768 88766 4028cf 28 API calls 88769 40bbbd 88766->88769 88770 40bbfe 88767->88770 88771 4028cf 28 API calls 88768->88771 88772 412774 14 API calls 88769->88772 88773 412774 14 API calls 88770->88773 88774 40bc3f 88771->88774 88775 40bbd1 88772->88775 88778 40bc12 88773->88778 88776 412774 14 API calls 88774->88776 88777 401e13 11 API calls 88775->88777 88779 40bc53 88776->88779 88777->88758 88780 401e13 11 API calls 88778->88780 88781 401e13 11 API calls 88779->88781 88780->88759 88781->88762 88783 401e0c 88782->88783 88817 402d8b 88784->88817 88786 4028dd 88786->88567 88788 4127c6 88787->88788 88790 412789 88787->88790 88789 401e13 11 API calls 88788->88789 88791 40be89 88789->88791 88792 4127a2 RegSetValueExW RegCloseKey 88790->88792 88791->88618 88792->88788 88795 402cb5 88793->88795 88794 402cd9 88800 402de3 88794->88800 88795->88794 88796 402cc8 88795->88796 88798 402cde 88795->88798 88804 403374 28 API calls 88796->88804 88798->88794 88805 402f21 11 API calls 88798->88805 88801 402daf 88800->88801 88806 4030f7 88801->88806 88803 402dcd 88803->88755 88804->88794 88805->88794 88807 403101 88806->88807 88809 403115 88807->88809 88810 4036c2 28 API calls 88807->88810 88809->88803 88810->88809 88812 40b0e9 88811->88812 88813 402ca8 28 API calls 88812->88813 88814 40b10c 88813->88814 88815 402de3 28 API calls 88814->88815 88816 40b11f 88815->88816 88816->88766 88818 402d97 88817->88818 88819 4030f7 28 API calls 88818->88819 88820 402dab 88819->88820 88820->88786 88822 40230d 88821->88822 88823 402325 28 API calls 88822->88823 88824 401f80 88823->88824 88824->88231 88833 411637 62 API calls 88827->88833

                                          Control-flow Graph

                                          APIs
                                          • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                          • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                          • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                          • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                          • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                          • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                          • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                          • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                          • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                          • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                          • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                          • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                          • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                          • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                          • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                          • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                          • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$HandleLibraryLoadModule
                                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                          • API String ID: 384173800-625181639
                                          • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                          • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                          • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                          • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 90 40d9b5-40d9bc 79->90 91 40d9ae-40d9b0 79->91 80->79 98 40d98e-40d9a4 call 401e8f call 412902 80->98 93 40d9c0-40d9cc call 41a463 90->93 94 40d9be 90->94 92 40dc95 91->92 92->49 103 40d9d5-40d9d9 93->103 104 40d9ce-40d9d0 93->104 94->93 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 128 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->128 129 40da2d call 4069ba 107->129 117 40d9e0-40d9e2 108->117 121 40d9e4-40d9e9 call 40699d call 4064d0 117->121 122 40d9ee-40da01 call 401d64 call 401e8f 117->122 121->122 122->107 138 40da03-40da09 122->138 163 40db22-40db26 128->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 128->164 129->128 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 188 40dad7-40db03 call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e 164->188 219 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->219 168 40dbb1-40dbbb call 4082d7 166->168 169 40db35-40dba7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 178 40dbc0-40dbe4 call 4022f8 call 4338c8 168->178 258 40dbac-40dbaf 169->258 196 40dbf3 178->196 197 40dbe6-40dbf1 call 436050 178->197 234 40db08-40db1d call 401e18 call 401e13 188->234 202 40dbf5-40dc6a call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 call 4338d1 call 401d64 call 40b125 196->202 197->202 202->219 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 202->274 272 40dd79-40dd7b 219->272 273 40dd5e 219->273 234->163 258->178 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->219 291 40dc93 274->291 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 291->92 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->343 354 40df6c-40df7f call 401d64 call 401e8f 342->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->355 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 354->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 414 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                          APIs
                                            • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                            • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                            • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                            • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                            • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                            • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                            • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                            • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                            • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Wk731bq71c.exe,00000104), ref: 0040D790
                                            • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                          • String ID: 0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\Wk731bq71c.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-I7G983$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                          • API String ID: 2830904901-1459824902
                                          • Opcode ID: 1484b2f7a7f91c3ee938c637a9a7dae7839d2338987acae383d1c6a0cb17adc1
                                          • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                          • Opcode Fuzzy Hash: 1484b2f7a7f91c3ee938c637a9a7dae7839d2338987acae383d1c6a0cb17adc1
                                          • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                          Control-flow Graph

                                          APIs
                                          • _wcslen.LIBCMT ref: 0040BC75
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\Wk731bq71c.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                          • _wcslen.LIBCMT ref: 0040BD54
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\Wk731bq71c.exe,00000000,00000000), ref: 0040BDF2
                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                          • _wcslen.LIBCMT ref: 0040BE34
                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                          • ExitProcess.KERNEL32 ref: 0040BED0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                          • String ID: 6$C:\Users\user\Desktop\Wk731bq71c.exe$del$open$BG$BG
                                          • API String ID: 1579085052-2649408203
                                          • Opcode ID: 48aa49d2481ff310f854708ea8db5c2cd318e18ba8c4d00b1811df617b72e965
                                          • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                          • Opcode Fuzzy Hash: 48aa49d2481ff310f854708ea8db5c2cd318e18ba8c4d00b1811df617b72e965
                                          • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE

                                          Control-flow Graph

                                          APIs
                                          • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LongNamePath
                                          • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                          • API String ID: 82841172-425784914
                                          • Opcode ID: 25ca853a921b0898f73c02d86405eba787a710581edfb9dc681f47d1c0bb237e
                                          • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                          • Opcode Fuzzy Hash: 25ca853a921b0898f73c02d86405eba787a710581edfb9dc681f47d1c0bb237e
                                          • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 628 218003c-2180047 629 2180049 628->629 630 218004c-2180263 call 2180a3f call 2180e0f call 2180d90 VirtualAlloc 628->630 629->630 645 218028b-2180292 630->645 646 2180265-2180289 call 2180a69 630->646 648 21802a1-21802b0 645->648 650 21802ce-21803c2 VirtualProtect call 2180cce call 2180ce7 646->650 648->650 651 21802b2-21802cc 648->651 657 21803d1-21803e0 650->657 651->648 658 2180439-21804b8 VirtualFree 657->658 659 21803e2-2180437 call 2180ce7 657->659 661 21804be-21804cd 658->661 662 21805f4-21805fe 658->662 659->657 664 21804d3-21804dd 661->664 665 218077f-2180789 662->665 666 2180604-218060d 662->666 664->662 670 21804e3-2180505 LoadLibraryA 664->670 668 218078b-21807a3 665->668 669 21807a6-21807b0 665->669 666->665 671 2180613-2180637 666->671 668->669 672 218086e-21808be LoadLibraryA 669->672 673 21807b6-21807cb 669->673 674 2180517-2180520 670->674 675 2180507-2180515 670->675 676 218063e-2180648 671->676 680 21808c7-21808f9 672->680 677 21807d2-21807d5 673->677 678 2180526-2180547 674->678 675->678 676->665 679 218064e-218065a 676->679 681 2180824-2180833 677->681 682 21807d7-21807e0 677->682 683 218054d-2180550 678->683 679->665 684 2180660-218066a 679->684 685 21808fb-2180901 680->685 686 2180902-218091d 680->686 692 2180839-218083c 681->692 687 21807e2 682->687 688 21807e4-2180822 682->688 689 21805e0-21805ef 683->689 690 2180556-218056b 683->690 691 218067a-2180689 684->691 685->686 687->681 688->677 689->664 696 218056d 690->696 697 218056f-218057a 690->697 693 218068f-21806b2 691->693 694 2180750-218077a 691->694 692->672 695 218083e-2180847 692->695 700 21806ef-21806fc 693->700 701 21806b4-21806ed 693->701 694->676 702 2180849 695->702 703 218084b-218086c 695->703 696->689 698 218059b-21805bb 697->698 699 218057c-2180599 697->699 711 21805bd-21805db 698->711 699->711 705 218074b 700->705 706 21806fe-2180748 700->706 701->700 702->672 703->692 705->691 706->705 711->683
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0218024D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: cess$kernel32.dll
                                          • API String ID: 4275171209-1230238691
                                          • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction ID: 5783bce6cd5ccce51b09679f3e05ee428f2a6a4bdf07989417e0223f411b94f1
                                          • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction Fuzzy Hash: B9526A75A01229DFDB64CF58C984BACBBB1BF09304F1580D9E94DAB351DB30AA89CF14

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                            • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                            • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                            • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                            • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                          • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseCurrentOpenQueryValueWow64
                                          • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                          • API String ID: 782494840-2070987746
                                          • Opcode ID: c28e8bf06c7bd464c54825a7174b2fee0dd0f803164bd22ac966e04bdcbe38d4
                                          • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                          • Opcode Fuzzy Hash: c28e8bf06c7bd464c54825a7174b2fee0dd0f803164bd22ac966e04bdcbe38d4
                                          • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 736 412774-412787 RegCreateKeyW 737 4127c6 736->737 738 412789-4127c4 call 4022f8 call 401e07 RegSetValueExW RegCloseKey 736->738 740 4127c8-4127d4 call 401e13 737->740 738->740
                                          APIs
                                          • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041277F
                                          • RegSetValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004742E0,759237E0,?), ref: 004127AD
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004742E0,759237E0,?,?,?,?,?,0040BE18,?,00000000), ref: 004127B8
                                          Strings
                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041277D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                          • API String ID: 1818849710-1051519024
                                          • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                          • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                          • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                          • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 746 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                                          APIs
                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                          • GetLastError.KERNEL32 ref: 0040BEF1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateErrorLastMutex
                                          • String ID: Rmc-I7G983
                                          • API String ID: 1925916568-3173645232
                                          • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                          • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                          • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                          • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 749 412513-41253f RegOpenKeyExA 750 412541-412567 RegQueryValueExA RegCloseKey 749->750 751 412572 749->751 750->751 752 412569-412570 750->752 753 412577-412583 call 401f66 751->753 752->753
                                          APIs
                                          • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                          • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                          • RegCloseKey.KERNEL32(?), ref: 0041255F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpenQueryValue
                                          • String ID:
                                          • API String ID: 3677997916-0
                                          • Opcode ID: 1596a47d3a3a9d7b824bf65cdf317066f9d5dabbc4d5e1023ecf94da71e9672a
                                          • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                          • Opcode Fuzzy Hash: 1596a47d3a3a9d7b824bf65cdf317066f9d5dabbc4d5e1023ecf94da71e9672a
                                          • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 756 4124b7-4124df RegOpenKeyExA 757 4124e1-412509 RegQueryValueExA RegCloseKey 756->757 758 41250f-412512 756->758 757->758 759 41250b-41250e 757->759
                                          APIs
                                          • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                          • RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpenQueryValue
                                          • String ID:
                                          • API String ID: 3677997916-0
                                          • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                          • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                          • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                          • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 788 5b07a6-5b07bf 789 5b07c1-5b07c3 788->789 790 5b07ca-5b07d6 CreateToolhelp32Snapshot 789->790 791 5b07c5 789->791 792 5b07d8-5b07de 790->792 793 5b07e6-5b07f3 Module32First 790->793 791->790 792->793 798 5b07e0-5b07e4 792->798 794 5b07fc-5b0804 793->794 795 5b07f5-5b07f6 call 5b0465 793->795 799 5b07fb 795->799 798->789 798->793 799->794
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005B07CE
                                          • Module32First.KERNEL32(00000000,00000224), ref: 005B07EE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390395586.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b0000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFirstModule32SnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 3833638111-0
                                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction ID: 5f20ef3ee0f14b5cbd34ce0806dc149e082bf947dbaad13e1c58f5f577320b0b
                                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction Fuzzy Hash: 78F062311017116FD7203AB5988DAAFBBECFF49765F101568E642910C0DE70F8454A61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 801 43360d-433610 802 43361f-433622 call 43a88c 801->802 804 433627-43362a 802->804 805 433612-43361d call 442200 804->805 806 43362c-43362d 804->806 805->802 809 43362e-433632 805->809 810 433638-433dec call 433d58 call 437bd7 809->810 811 433ded-433e09 call 433d8b call 437bd7 809->811 810->811
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                            • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,1DC,?,00475B70,00473D54,00000000,?,?,?,?,00434431,?,0046D680,?), ref: 00437C37
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Exception@8Throw$ExceptionRaise
                                          • String ID:
                                          • API String ID: 3476068407-0
                                          • Opcode ID: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                          • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                          • Opcode Fuzzy Hash: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                          • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 821 2180e0f-2180e24 SetErrorMode * 2 822 2180e2b-2180e2c 821->822 823 2180e26 821->823 823->822
                                          APIs
                                          • SetErrorMode.KERNEL32(00000400,?,?,02180223,?,?), ref: 02180E19
                                          • SetErrorMode.KERNEL32(00000000,?,?,02180223,?,?), ref: 02180E1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorMode
                                          • String ID:
                                          • API String ID: 2340568224-0
                                          • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction ID: a846ea09069fb0ff73c478be89de1126635b9151421e274922989b7d7294ded1
                                          • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction Fuzzy Hash: 94D0123214512C77D7003A94DC09BCE7B1CDF09B66F108011FB0DD9080C770954046E5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 824 446aff-446b0b 825 446b3d-446b48 call 445354 824->825 826 446b0d-446b0f 824->826 833 446b4a-446b4c 825->833 828 446b11-446b12 826->828 829 446b28-446b39 RtlAllocateHeap 826->829 828->829 830 446b14-446b1b call 4447c5 829->830 831 446b3b 829->831 830->825 836 446b1d-446b26 call 442200 830->836 831->833 836->825 836->829
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                          • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                          • Opcode Fuzzy Hash: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                          • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 005B04B6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390395586.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b0000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction ID: 1b4e7d6d64ef6482b3ae29e82acede09d6b0a6ae3ef443c5ed4c03ad212d50f9
                                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction Fuzzy Hash: A0112A79A40208EFDB01DF98C985E99BFF5AB08350F058094FA489B362D771EA50DB80
                                          APIs
                                          • SetEvent.KERNEL32(?,?), ref: 00406F28
                                          • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                          • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                            • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                            • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                            • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                            • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                            • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                            • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                            • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                            • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                            • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                            • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                            • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                          • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                          • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                          • DeleteFileA.KERNEL32(?), ref: 004078CC
                                            • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                            • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                            • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                          • Sleep.KERNEL32(000007D0), ref: 00407976
                                          • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                            • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                          • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                          • API String ID: 2918587301-599666313
                                          • Opcode ID: 9e87c9ea4d06369ebd4559c2ca031d7f012219af99fef09ccbc97e5876996a79
                                          • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                          • Opcode Fuzzy Hash: 9e87c9ea4d06369ebd4559c2ca031d7f012219af99fef09ccbc97e5876996a79
                                          • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 0040508E
                                            • Part of subcall function 004334CF: RtlEnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                            • Part of subcall function 004334CF: RtlLeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          • __Init_thread_footer.LIBCMT ref: 004050CB
                                          • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                          • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                            • Part of subcall function 00433519: RtlEnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                            • Part of subcall function 00433519: RtlLeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                          • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                          • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                          • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                            • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                          • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                          • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                          • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                          • CloseHandle.KERNEL32 ref: 004053CD
                                          • CloseHandle.KERNEL32 ref: 004053D5
                                          • CloseHandle.KERNEL32 ref: 004053E7
                                          • CloseHandle.KERNEL32 ref: 004053EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                          • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                          • API String ID: 3815868655-81343324
                                          • Opcode ID: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                          • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                          • Opcode Fuzzy Hash: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                          • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                          APIs
                                          • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                            • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                            • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                            • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                          • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                          • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                            • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                            • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                            • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                          • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                          • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                          • API String ID: 65172268-860466531
                                          • Opcode ID: 8581d9748b8e86ebc65c0ea9785c10283561ebd3bf29990b7e043b02adbb92ce
                                          • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                          • Opcode Fuzzy Hash: 8581d9748b8e86ebc65c0ea9785c10283561ebd3bf29990b7e043b02adbb92ce
                                          • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                          • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                          • FindClose.KERNEL32(00000000), ref: 0040B517
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$CloseFile$FirstNext
                                          • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                          • API String ID: 1164774033-3681987949
                                          • Opcode ID: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                          • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                          • Opcode Fuzzy Hash: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                          • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                          APIs
                                          • NtdllDefWindowProc_A.USER32(?,00000401,?,?), ref: 0041CAE9
                                          • GetCursorPos.USER32(?), ref: 0041CAF8
                                          • SetForegroundWindow.USER32(?), ref: 0041CB01
                                          • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                          • Shell_NotifyIcon.SHELL32(00000002,00473B50), ref: 0041CB6C
                                          • ExitProcess.KERNEL32 ref: 0041CB74
                                          • CreatePopupMenu.USER32 ref: 0041CB7A
                                          • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyNtdllProc_ProcessShell_Track
                                          • String ID: Close
                                          • API String ID: 1665278180-3535843008
                                          • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                          • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                          • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                          • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                          • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                          • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                          • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$Close$File$FirstNext
                                          • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                          • API String ID: 3527384056-432212279
                                          • Opcode ID: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                          • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                          • Opcode Fuzzy Hash: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                          • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                          • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                            • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                            • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                            • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                          • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                          • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                          • API String ID: 726551946-3025026198
                                          • Opcode ID: fbe2b6585210162948063d4cf0d1459cf9f04c41654406c90128943a70feb1e3
                                          • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                          • Opcode Fuzzy Hash: fbe2b6585210162948063d4cf0d1459cf9f04c41654406c90128943a70feb1e3
                                          • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                          APIs
                                          • OpenClipboard.USER32 ref: 004159C7
                                          • EmptyClipboard.USER32 ref: 004159D5
                                          • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                          • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                          • CloseClipboard.USER32 ref: 00415A5A
                                          • OpenClipboard.USER32 ref: 00415A61
                                          • GetClipboardData.USER32(0000000D), ref: 00415A71
                                          • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                          • CloseClipboard.USER32 ref: 00415A89
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                          • String ID:
                                          • API String ID: 3520204547-0
                                          • Opcode ID: 431ffb346c899dbd036f51501a70d0e621ef04c23884f1c5703b17159bdbab49
                                          • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                          • Opcode Fuzzy Hash: 431ffb346c899dbd036f51501a70d0e621ef04c23884f1c5703b17159bdbab49
                                          • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                          APIs
                                          • NtdllDefWindowProc_A.NTDLL(?,00000401,?,?), ref: 0219CD50
                                          • GetCursorPos.USER32(?), ref: 0219CD5F
                                          • SetForegroundWindow.USER32(?), ref: 0219CD68
                                          • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0219CD82
                                          • Shell_NotifyIcon.SHELL32(00000002,00473B50), ref: 0219CDD3
                                          • ExitProcess.KERNEL32 ref: 0219CDDB
                                          • CreatePopupMenu.USER32 ref: 0219CDE1
                                          • AppendMenuA.USER32(00000000,00000000,00000000,0046C11C), ref: 0219CDF6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyNtdllProc_ProcessShell_Track
                                          • String ID:
                                          • API String ID: 1665278180-0
                                          • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                          • Instruction ID: be21c7771e33dbe7366c49403a57de3b5bb9e5e45a5dda004f2b5ac9b341b923
                                          • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                          • Instruction Fuzzy Hash: B5210E31154206FFDF195F68ED0EAA93F75EB08302F004135B946A50B2D7B6DA60EB98
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0$1$2$3$4$5$6$7
                                          • API String ID: 0-3177665633
                                          • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                          • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                          • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                          • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 00409B3F
                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                          • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                          • GetKeyState.USER32(00000010), ref: 00409B5C
                                          • GetKeyboardState.USER32(?), ref: 00409B67
                                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                          • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                          • String ID: 8[G
                                          • API String ID: 1888522110-1691237782
                                          • Opcode ID: 4c5f216413db17f4615ba8778b0ac1bcd5e616b80ac971dec25a7d7e74698f93
                                          • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                          • Opcode Fuzzy Hash: 4c5f216413db17f4615ba8778b0ac1bcd5e616b80ac971dec25a7d7e74698f93
                                          • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                          APIs
                                          • _wcslen.LIBCMT ref: 00406788
                                          • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Object_wcslen
                                          • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                          • API String ID: 240030777-3166923314
                                          • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                          • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                          • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                          • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                          APIs
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 02199B3F
                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 02199B8E
                                          • GetLastError.KERNEL32 ref: 02199B9C
                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 02199BD4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                          • String ID:
                                          • API String ID: 3587775597-0
                                          • Opcode ID: e61e99f355a85b792043c415c774071641b882a3dc166781f1924c38db1b4eec
                                          • Instruction ID: 5ed598e68e5b24798dedfde2e15f3cc16f80e004444ba650319d7fbc217505bb
                                          • Opcode Fuzzy Hash: e61e99f355a85b792043c415c774071641b882a3dc166781f1924c38db1b4eec
                                          • Instruction Fuzzy Hash: 47813871148344AFC715FB20D890EAFB7A9BF94B04F50492DF99282190EF71AA05CF96
                                          APIs
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                          • GetLastError.KERNEL32 ref: 00419935
                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                          • String ID:
                                          • API String ID: 3587775597-0
                                          • Opcode ID: 77bcc6dd603a76696f42a2f40dec095e9e88890b7a54f8f14d04a177b6806e79
                                          • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                          • Opcode Fuzzy Hash: 77bcc6dd603a76696f42a2f40dec095e9e88890b7a54f8f14d04a177b6806e79
                                          • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514C3
                                          • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                          • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                          • GetLocaleInfoW.KERNEL32(?,00001001,<D,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 00451594
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                          • String ID: <D$<D$<D
                                          • API String ID: 745075371-3495170934
                                          • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                          • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                          • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                          • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 0219B6F0
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0219B722
                                          • SetFileAttributesW.KERNEL32(?,00000080), ref: 0219B790
                                          • DeleteFileW.KERNEL32(?), ref: 0219B79D
                                            • Part of subcall function 0219B696: RemoveDirectoryW.KERNEL32(?), ref: 0219B773
                                          • FindClose.KERNEL32(00000000), ref: 0219B7C8
                                          • RemoveDirectoryW.KERNEL32(00000000), ref: 0219B7CF
                                          • GetLastError.KERNEL32 ref: 0219B7D7
                                          • FindClose.KERNEL32(00000000), ref: 0219B7EA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                          • String ID:
                                          • API String ID: 2341273852-0
                                          • Opcode ID: 5c62029e558c151831161c7648b51b3c9b0b43d71b7e0bfa42328357c6cc7f75
                                          • Instruction ID: a679911cc43ccb9205d25e9b5b8c6bb070ac048306e03dd4f11cc0f40317486b
                                          • Opcode Fuzzy Hash: 5c62029e558c151831161c7648b51b3c9b0b43d71b7e0bfa42328357c6cc7f75
                                          • Instruction Fuzzy Hash: A631727288821CAACF25DBB0AC88EEA77BCAF04305F4405E6F505D2091EB76D784CF24
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B529
                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B536
                                            • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                          • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00473EE8,00000000), ref: 0041B570
                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B583
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                          • String ID:
                                          • API String ID: 2341273852-0
                                          • Opcode ID: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                          • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                          • Opcode Fuzzy Hash: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                          • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                          • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Find$CreateFirstNext
                                          • String ID: @CG$XCG$`HG$`HG$>G
                                          • API String ID: 341183262-3780268858
                                          • Opcode ID: 0e69cbb53cdaa142d960a4e6b0f409f8ff10ac6bbdb54b10014c37c1b2324f6f
                                          • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                          • Opcode Fuzzy Hash: 0e69cbb53cdaa142d960a4e6b0f409f8ff10ac6bbdb54b10014c37c1b2324f6f
                                          • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                          APIs
                                          • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                          • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                          • GetLastError.KERNEL32 ref: 00409A1B
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                          • TranslateMessage.USER32(?), ref: 00409A7A
                                          • DispatchMessageA.USER32(?), ref: 00409A85
                                          Strings
                                          • Keylogger initialization failure: error , xrefs: 00409A32
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                          • String ID: Keylogger initialization failure: error
                                          • API String ID: 3219506041-952744263
                                          • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                          • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                          • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                          • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,00465F1C), ref: 0218B61B
                                          • FindClose.KERNEL32(00000000), ref: 0218B635
                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0218B758
                                          • FindClose.KERNEL32(00000000), ref: 0218B77E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$CloseFile$FirstNext
                                          • String ID:
                                          • API String ID: 1164774033-0
                                          • Opcode ID: 5b02bdbcf4a37e1aca2b174e4fdcca7b9d7d4ca2704527aaaf21edbe9df3a355
                                          • Instruction ID: c0d23e81c4279e6f18ec78ef93f88eefdb4fe390c38c56f05ef38f3151c70852
                                          • Opcode Fuzzy Hash: 5b02bdbcf4a37e1aca2b174e4fdcca7b9d7d4ca2704527aaaf21edbe9df3a355
                                          • Instruction Fuzzy Hash: E2516131A842499ECB16FB70DCD5EEDB73AAF10304F6401A9F905A21D0FF306A46CE95
                                          APIs
                                          • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                          • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressCloseCreateLibraryLoadProcsend
                                          • String ID: SHDeleteKeyW$Shlwapi.dll
                                          • API String ID: 2127411465-314212984
                                          • Opcode ID: 8dfcdcdd3c4e88b30ba4e76c6c09a06c6f24818a8b0641c99e1b47a7fc256751
                                          • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                          • Opcode Fuzzy Hash: 8dfcdcdd3c4e88b30ba4e76c6c09a06c6f24818a8b0641c99e1b47a7fc256751
                                          • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 02199126
                                            • Part of subcall function 0219B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B89A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CreateFindFirst
                                          • String ID: @CG$XCG$`HG$`HG$>G
                                          • API String ID: 41799849-3780268858
                                          • Opcode ID: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                                          • Instruction ID: 2dbf6419f6753efdbc85ceae3830703a8c97c22746ab57d86e3b02693903ffa2
                                          • Opcode Fuzzy Hash: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                                          • Instruction Fuzzy Hash: C48154315882805FD71AFB24D8E4EEFB3AAAF91310F54492DF956471D0EF309A0ACE52
                                          APIs
                                            • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                            • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                            • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                          • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                          • ExitProcess.KERNEL32 ref: 0040E672
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseExitOpenProcessQuerySleepValue
                                          • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                          • API String ID: 2281282204-3981147832
                                          • Opcode ID: e7420bd81adcf7ecaeb63c441a7eb2a496d40f418d65372005f5d4e07d0bafb2
                                          • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                          • Opcode Fuzzy Hash: e7420bd81adcf7ecaeb63c441a7eb2a496d40f418d65372005f5d4e07d0bafb2
                                          • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                                          APIs
                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                          • GetLastError.KERNEL32 ref: 0040B261
                                          Strings
                                          • [Chrome StoredLogins not found], xrefs: 0040B27B
                                          • UserProfile, xrefs: 0040B227
                                          • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                          • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DeleteErrorFileLast
                                          • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                          • API String ID: 2018770650-1062637481
                                          • Opcode ID: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                          • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                          • Opcode Fuzzy Hash: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                          • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                          • GetLastError.KERNEL32 ref: 00416B02
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                          • String ID: SeShutdownPrivilege
                                          • API String ID: 3534403312-3733053543
                                          • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                          • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                          • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                          • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __floor_pentium4
                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                          • API String ID: 4168288129-2761157908
                                          • Opcode ID: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                                          • Instruction ID: 57cc16b57fb9b80973019f24a4c29afa226e887048a240d5689d112d8919aadd
                                          • Opcode Fuzzy Hash: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                                          • Instruction Fuzzy Hash: 08C26F72D046288FDB25CE28DD407EAB7B5EB44346F1441EBD84DE7242E778AE898F44
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 004089AE
                                            • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                            • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                            • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                            • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                            • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                            • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                            • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                          • String ID:
                                          • API String ID: 4043647387-0
                                          • Opcode ID: 6e5f7540c8d334c07a25712d717a24ef5d0b91b8600f37f51d4e62cbeba4b248
                                          • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                          • Opcode Fuzzy Hash: 6e5f7540c8d334c07a25712d717a24ef5d0b91b8600f37f51d4e62cbeba4b248
                                          • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ManagerStart
                                          • String ID:
                                          • API String ID: 276877138-0
                                          • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                          • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                          • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                          • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                          APIs
                                            • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                            • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                            • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                            • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                            • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                          • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                          • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                          • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                          • String ID: PowrProf.dll$SetSuspendState
                                          • API String ID: 1589313981-1420736420
                                          • Opcode ID: 760194600065aa930d76b91875d7e389ee81a04dff370ffb8731a3af4adaf024
                                          • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                          • Opcode Fuzzy Hash: 760194600065aa930d76b91875d7e389ee81a04dff370ffb8731a3af4adaf024
                                          • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,021D1769,?,00000000), ref: 021D14E3
                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,021D1769,?,00000000), ref: 021D150C
                                          • GetACP.KERNEL32(?,?,021D1769,?,00000000), ref: 021D1521
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: ACP$OCP
                                          • API String ID: 2299586839-711371036
                                          • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                          • Instruction ID: e4a014b86cf0892665e77313630c1748be7137c50fc4710176cbceffd01f5885
                                          • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                          • Instruction Fuzzy Hash: 4021AF22A80101FADB34CF55C944BA773E7EF45A65B568564F90EDB214FB32EA81C390
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 0045127C
                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 004512A5
                                          • GetACP.KERNEL32(?,?,00451502,?,00000000), ref: 004512BA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: ACP$OCP
                                          • API String ID: 2299586839-711371036
                                          • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                          • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                          • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                          • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                          APIs
                                          • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                          • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                          • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                          • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Resource$FindLoadLockSizeof
                                          • String ID: SETTINGS
                                          • API String ID: 3473537107-594951305
                                          • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                          • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                          • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                          • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 02189013
                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 0218908B
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 021890B4
                                          • FindClose.KERNEL32(?), ref: 021890CB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstH_prologNext
                                          • String ID:
                                          • API String ID: 1157919129-0
                                          • Opcode ID: cae9dc3e290e62eb3ac1bcabecde37f344aa65a3c2dada11a4f4a429893bb3a7
                                          • Instruction ID: 025612d9b9d331b391d2bf9821996d96d540f1c57f66c28d89fd93e3eacc5233
                                          • Opcode Fuzzy Hash: cae9dc3e290e62eb3ac1bcabecde37f344aa65a3c2dada11a4f4a429893bb3a7
                                          • Instruction Fuzzy Hash: 90814F729801589FCB16FBA0DCD0EED777AAF14310F54426AE816A7190EF34AB49CF91
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C7185
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C7192
                                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 021D172A
                                          • IsValidCodePage.KERNEL32(00000000), ref: 021D1785
                                          • IsValidLocale.KERNEL32(?,00000001), ref: 021D1794
                                          • GetLocaleInfoW.KERNEL32(?,00001001,021C3F53,00000040,?,021C4073,00000055,00000000,?,?,00000055,00000000), ref: 021D17DC
                                          • GetLocaleInfoW.KERNEL32(?,00001002,021C3FD3,00000040), ref: 021D17FB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                          • String ID:
                                          • API String ID: 745075371-0
                                          • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                          • Instruction ID: bf9ee213f3a906e759c258fadb6ffc5616f6abe996eced6844d3dda55b6f8726
                                          • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                          • Instruction Fuzzy Hash: C9519075A80205FFDB10DFA4CC44ABE77B9AF08305F180569E918EB1A0EB709A40CB61
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 02187CF8
                                          • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02187DB1
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02187DD5
                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02187EDD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstH_prologNext
                                          • String ID:
                                          • API String ID: 1157919129-0
                                          • Opcode ID: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                          • Instruction ID: c0c7230f5d9b181b73bb01dc966f3c3deee80155d9e8c62ebef5cafa219ca3dc
                                          • Opcode Fuzzy Hash: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                          • Instruction Fuzzy Hash: 165151729802499ECF05FBA4DDD5AEDB77AAF11300FA00169E816A71D0EF349B49CF91
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00407A91
                                          • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstH_prologNext
                                          • String ID:
                                          • API String ID: 1157919129-0
                                          • Opcode ID: ec8430d9ffa504f704647f0c2b6421991452e1217054f7aec6c7695ec66ba3f0
                                          • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                          • Opcode Fuzzy Hash: ec8430d9ffa504f704647f0c2b6421991452e1217054f7aec6c7695ec66ba3f0
                                          • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                          APIs
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                          • _free.LIBCMT ref: 00448067
                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                          • _free.LIBCMT ref: 00448233
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                          • String ID:
                                          • API String ID: 1286116820-0
                                          • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                          • Instruction ID: adcac59616ce0bf4d9b6f5e4feac4fc1c4b096f081e8a0f87c9a15d47e4c4f65
                                          • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                          • Instruction Fuzzy Hash: 13510B719002099BE714DF69DC819AFB7BCEF41354F10456FE454A32A1EF389E46CB58
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 02196D2B
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 02196D32
                                          • LookupPrivilegeValueA.ADVAPI32(00000000,0046BA18,?), ref: 02196D44
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 02196D63
                                          • GetLastError.KERNEL32 ref: 02196D69
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                          • String ID:
                                          • API String ID: 3534403312-0
                                          • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                          • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                          • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                          • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DownloadExecuteFileShell
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe$open
                                          • API String ID: 2825088817-2745123326
                                          • Opcode ID: d856352b29c500f65ac61f264686a0ac45c8e93dcc938b66659ffa0f0ca1f413
                                          • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                          • Opcode Fuzzy Hash: d856352b29c500f65ac61f264686a0ac45c8e93dcc938b66659ffa0f0ca1f413
                                          • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                          APIs
                                            • Part of subcall function 0219271E: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 0219273E
                                            • Part of subcall function 0219271E: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 0219275C
                                            • Part of subcall function 0219271E: RegCloseKey.ADVAPI32(00000000), ref: 02192767
                                          • Sleep.KERNEL32(00000BB8), ref: 0218E86A
                                          • ExitProcess.KERNEL32 ref: 0218E8D9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseExitOpenProcessQuerySleepValue
                                          • String ID: pth_unenc$BG
                                          • API String ID: 2281282204-2233081382
                                          • Opcode ID: 893b02ec2893ac076e1b48ec4804a82b241512304dbf54cdddd5c3cf734e141d
                                          • Instruction ID: d654dce650ff057fb76693d237fd53a6336ca771bc83239c5f979b10a8a88a06
                                          • Opcode Fuzzy Hash: 893b02ec2893ac076e1b48ec4804a82b241512304dbf54cdddd5c3cf734e141d
                                          • Instruction Fuzzy Hash: 64210631BC43506FDA187A798899A7E359B6B81701F600028FC15572C9FF768A008FA7
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 02186D44
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 02186E0C
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFind$FirstNextsend
                                          • String ID: x@G$x@G
                                          • API String ID: 4113138495-3390264752
                                          • Opcode ID: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                          • Instruction ID: 999b18accf037a07672c7871757897b3a7e5d3edbcdf3af88efcc052b4ecb337
                                          • Opcode Fuzzy Hash: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                          • Instruction Fuzzy Hash: A1219F321882819FC715FB60DDD0DAFB7AEEF80350F500A29FA9652190EF359A09CE52
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFind$FirstNextsend
                                          • String ID: x@G$x@G
                                          • API String ID: 4113138495-3390264752
                                          • Opcode ID: cd087bff8509dcec767edfc990b825013f662665e895b251329c0582a44e2ee5
                                          • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                          • Opcode Fuzzy Hash: cd087bff8509dcec767edfc990b825013f662665e895b251329c0582a44e2ee5
                                          • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                          APIs
                                          • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                            • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                            • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                            • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateInfoParametersSystemValue
                                          • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                          • API String ID: 4127273184-3576401099
                                          • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                          • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                          • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                          • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,021C3F5A,?,?,?,?,021C39B1,?,00000004), ref: 021D0DC8
                                          • _wcschr.LIBVCRUNTIME ref: 021D0E58
                                          • _wcschr.LIBVCRUNTIME ref: 021D0E66
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,021C3F5A,00000000,021C407A), ref: 021D0F09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                          • String ID:
                                          • API String ID: 4212172061-0
                                          • Opcode ID: 2f1efdd49f250f153a7c8dca19099ac794f5d0f52f96597e3c8d2ebbc38e997e
                                          • Instruction ID: 89cc582098066a486c35acaac2db337609953b0c82da14aa94fcdb6514ef8548
                                          • Opcode Fuzzy Hash: 2f1efdd49f250f153a7c8dca19099ac794f5d0f52f96597e3c8d2ebbc38e997e
                                          • Instruction Fuzzy Hash: 98610775680705EFDB24AB35DC45BABB3ADEF4C310F24056AE909DB180EB75E940CBA0
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443CF3,?,?,?,?,?,?,00000004), ref: 00450B61
                                          • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                          • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443CF3,00000000,00443E13), ref: 00450CA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                          • String ID:
                                          • API String ID: 4212172061-0
                                          • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                          • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                          • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                          • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00408DAC
                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFind$FirstH_prologNext
                                          • String ID:
                                          • API String ID: 301083792-0
                                          • Opcode ID: 1d32f1c3acb3780f03dfc46b76f877323ce745960ff3d00be013f2574f5b8748
                                          • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                          • Opcode Fuzzy Hash: 1d32f1c3acb3780f03dfc46b76f877323ce745960ff3d00be013f2574f5b8748
                                          • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorInfoLastLocale$_free$_abort
                                          • String ID:
                                          • API String ID: 2829624132-0
                                          • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                          • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                          • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                          • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                          APIs
                                          • ExitWindowsEx.USER32(00000000,00000001), ref: 02195BC2
                                          • LoadLibraryA.KERNEL32(0046B9C0,0046B9B0), ref: 02195BD7
                                          • GetProcAddress.KERNEL32(00000000), ref: 02195BDE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressExitLibraryLoadProcWindows
                                          • String ID:
                                          • API String ID: 1366546845-0
                                          • Opcode ID: 0a607b4a7b5ecc12f789a4cc2078a46f2f116dcd92e244ce5a1d878263211a66
                                          • Instruction ID: 079c42d11e47d4bdef3d00fc6bb4c8892ddc3855cdc5679ff329fd791dd85eb0
                                          • Opcode Fuzzy Hash: 0a607b4a7b5ecc12f789a4cc2078a46f2f116dcd92e244ce5a1d878263211a66
                                          • Instruction Fuzzy Hash: 0B2164B16C4741BFCF15BBB088D4ABE239B9F41380F554829F50797581EF74C90A8E66
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 021BA9BC
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 021BA9C6
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 021BA9D3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                          • Instruction ID: fcfbfc533f8a48774a55252a33a2fce4d47185c4fb147b2ad9ccc540f31ae663
                                          • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                          • Instruction Fuzzy Hash: BE31A675D41228ABCB21DF64D9887DDB7B8BF08711F5042EAE81CA7250EB709B858F45
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0043A755
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A75F
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0043A76C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                          • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                          • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                          • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                          APIs
                                          • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,00471B2C,00000000,021B282C,00000034,00471B2C,?,?), ref: 021B2BB3
                                          • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,021B28BE,00000000,?,00000000), ref: 021B2BC9
                                          • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,021B28BE,00000000,?,00000000,0219D9C7), ref: 021B2BDB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Crypt$Context$AcquireRandomRelease
                                          • String ID:
                                          • API String ID: 1815803762-0
                                          • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                          • Instruction ID: 193cae91406e27c2162cfff2c20f74c442d30815dbba8a489ae2f8ed74bf83a1
                                          • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                          • Instruction Fuzzy Hash: 0FE0923134C310BBEB320F25BC08FA73AA4DF81B71F610A38F661E40E4CB7184448518
                                          APIs
                                          • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                          • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Crypt$Context$AcquireRandomRelease
                                          • String ID:
                                          • API String ID: 1815803762-0
                                          • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                          • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                          • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                          • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000000,?,021C2791,00000000,0046DAE0,0000000C,021C28E8,00000000,00000002,00000000), ref: 021C27DC
                                          • TerminateProcess.KERNEL32(00000000,?,021C2791,00000000,0046DAE0,0000000C,021C28E8,00000000,00000002,00000000), ref: 021C27E3
                                          • ExitProcess.KERNEL32 ref: 021C27F5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                          • Instruction ID: 60c034f03ba066fa43b65ece28b0effcd0e6268e374ca5d49634c0bab7a5367f
                                          • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                          • Instruction Fuzzy Hash: 19E0B63A044608EFCF11AF55ED48A893B6AEB60742F104078FC098A532CB75E982CE94
                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                                          • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                                          • ExitProcess.KERNEL32 ref: 0044258E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                          • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                          • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                          • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                          APIs
                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0219532A,00000000), ref: 0219AF33
                                          • NtSuspendProcess.NTDLL(00000000), ref: 0219AF40
                                          • CloseHandle.KERNEL32(00000000,?,?,0219532A,00000000), ref: 0219AF49
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandleOpenSuspend
                                          • String ID:
                                          • API String ID: 1999457699-0
                                          • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                          • Instruction ID: 980563e00705e88b558c5497868a691c6acabddd74eba0557de8ba6a307acf00
                                          • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                          • Instruction Fuzzy Hash: D2D0A733508131638220176A7C0CD8BEEACDFC1DB37024175F408C3220DB30C84186F4
                                          APIs
                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0219534F,00000000), ref: 0219AF5F
                                          • NtResumeProcess.NTDLL(00000000), ref: 0219AF6C
                                          • CloseHandle.KERNEL32(00000000,?,?,0219534F,00000000), ref: 0219AF75
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandleOpenResume
                                          • String ID:
                                          • API String ID: 3614150671-0
                                          • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                          • Instruction ID: f50022bc58cae078a23f6663fee0a20191c778d3d49f567a0b7365ca95789471
                                          • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                          • Instruction Fuzzy Hash: B1D09E33508121678621176A7C0D99BEDA9DFC69B37064275F505D25619A60D84186A4
                                          APIs
                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150C3,00000000), ref: 0041ACCC
                                          • NtSuspendProcess.NTDLL(00000000), ref: 0041ACD9
                                          • CloseHandle.KERNEL32(00000000,?,?,004150C3,00000000), ref: 0041ACE2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandleOpenSuspend
                                          • String ID:
                                          • API String ID: 1999457699-0
                                          • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                          • Instruction ID: f0940f0a464cb9da12e036c8bcda16370f3965740af83b573a45ae51f9acba0f
                                          • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                          • Instruction Fuzzy Hash: E7D0A733605131638221176A7C0CC87EE6CDFC1EB37024136F404C3220DA30C84186F4
                                          APIs
                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150E8,00000000), ref: 0041ACF8
                                          • NtResumeProcess.NTDLL(00000000), ref: 0041AD05
                                          • CloseHandle.KERNEL32(00000000,?,?,004150E8,00000000), ref: 0041AD0E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandleOpenResume
                                          • String ID:
                                          • API String ID: 3614150671-0
                                          • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                          • Instruction ID: b64f47c6af987b25b68fadd97e6a7e629856a7b738c344dffca8a71896aa998e
                                          • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                          • Instruction Fuzzy Hash: DFD0A733504132638220176A7C0CC87EDADDFC5EB37024236F404C3621DA34C841C6F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: .$GetProcAddress.$l
                                          • API String ID: 0-2784972518
                                          • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction ID: 12504da68fe851acd66978f1aff55e238d901a755d33189b1f9763ae4d0cf1d3
                                          • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction Fuzzy Hash: 91314AB6940609DFDB10DF99C880AAEBBF9FF48324F15414AD845A7310D7B1EA49CFA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: .
                                          • API String ID: 0-248832578
                                          • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                          • Instruction ID: fa59296881ed8f6412142d0e76c23cc2363c3f24d87ef8c635c81e7b41041fe2
                                          • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                          • Instruction Fuzzy Hash: AB310579840249AFCB289E78DC84EFA7BBEDF86314F2401BCE819D7251E7309A40CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: .
                                          • API String ID: 0-248832578
                                          • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                          • Instruction ID: db76f937e81630575b2700384d205b0ac401e8f874fa32e43cac1aabc581782c
                                          • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                          • Instruction Fuzzy Hash: CB310471900209AFEB249E79CC84EEB7BBDDB86318F1101AEF91897251E6389D458B64
                                          APIs
                                          • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0219BED3
                                            • Part of subcall function 02192939: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 02192948
                                            • Part of subcall function 02192939: RegSetValueExA.ADVAPI32(004655B0,0046BE08,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0219BEAD,0046BE08,004655B0,00000001,00473EE8,00000000), ref: 02192970
                                            • Part of subcall function 02192939: RegCloseKey.ADVAPI32(004655B0,?,?,0219BEAD,0046BE08,004655B0,00000001,00473EE8,00000000,?,02187C44,00000001), ref: 0219297B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateInfoParametersSystemValue
                                          • String ID: Control Panel\Desktop
                                          • API String ID: 4127273184-27424756
                                          • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                          • Instruction ID: edcf25b10620cfc1c446acf63a6ecaf809c09d942cf54517ff795674a79f08ee
                                          • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                          • Instruction Fuzzy Hash: DD117F32BC42503ADD1934395D5BB7E280BD346B54FA1011AEB126B7C9EBDB4B9007DB
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                          • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,<D,?,00451497,00000000,?,?,?), ref: 00450DB4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID: <D
                                          • API String ID: 1084509184-3866323178
                                          • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                          • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                          • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                          • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                          • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,<D,?,0045145B,<D,?,?,?,?,?,00443CEC,?,?), ref: 00450E29
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID: <D
                                          • API String ID: 1084509184-3866323178
                                          • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                          • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                          • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                          • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: GetLocaleInfoEx
                                          • API String ID: 2299586839-2904428671
                                          • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                          • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                          • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                          • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f628971186b7869ff55a994468a376647b4631b563bdc3b7b4e6f267e50c07e
                                          • Instruction ID: db178d62e7a8b70507bb57dd3de6087f36951f710fafabaeced4faca1af59257
                                          • Opcode Fuzzy Hash: 6f628971186b7869ff55a994468a376647b4631b563bdc3b7b4e6f267e50c07e
                                          • Instruction Fuzzy Hash: 8A022B75E80219AFDF14CFA9C8807AEBBB1EF58324F25826DD819E7345D730A941CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                          • Instruction ID: cffdc6bb8eb20f5336ace8b102e865ec7dcfb2cf624fb46ac032ba80a60d6a90
                                          • Opcode Fuzzy Hash: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                          • Instruction Fuzzy Hash: 8A024C71E002199BEF14CFA9C9806AEBBF1FF88314F25826AD919E7350D735AD45CB84
                                          APIs
                                          • GetComputerNameExW.KERNEL32(00000001,?,0000002B,00474358), ref: 0041A7BF
                                          • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Name$ComputerUser
                                          • String ID:
                                          • API String ID: 4229901323-0
                                          • Opcode ID: e360d453fdea0c499a56342dcb6d187201a55dd0bc8494d0bc2bf59a17590710
                                          • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                          • Opcode Fuzzy Hash: e360d453fdea0c499a56342dcb6d187201a55dd0bc8494d0bc2bf59a17590710
                                          • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,021D2334,?,?,00000008,?,?,021D5679,00000000), ref: 021D2566
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                          • Instruction ID: 0dc72ef502d4f4fa385ca482c0a8c541ee16585f6167c4ef0f9fd3d1916dfe26
                                          • Opcode Fuzzy Hash: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                          • Instruction Fuzzy Hash: 7BB14031650609DFD719CF28C49AB957BE0FF45364F258658ECAACF2A2C335E991CB40
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004520CD,?,?,00000008,?,?,00455412,00000000), ref: 004522FF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                          • Instruction ID: 47108b7899804ebb5d40a9255b8f0d240b678f8396b787326aeb691ef157153f
                                          • Opcode Fuzzy Hash: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                          • Instruction Fuzzy Hash: C0B18F351106089FD715CF28C586B567BE0FF06325F29869AEC99CF3A2C379E986CB44
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                          • Instruction ID: 1efa3ab06a436e38b0d33fd48d55f9ef02dc655a315b9b0d7835d9d6c7d57601
                                          • Opcode Fuzzy Hash: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                          • Instruction Fuzzy Hash: E202603274C3004FD724EF39DA51A6EB3E2BFCC754F15492DE985AB280DF74A8498A46
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                          • Instruction ID: f72c02501a8b687524d4eed2bba9748ce27a8789a4669d3223b659a6f876a8a8
                                          • Opcode Fuzzy Hash: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                          • Instruction Fuzzy Hash: 8002B3727083004BD714DF39D95272EF3E2AFCC758F15492EF499AB391DA78A8058A4A
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C7185
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C7192
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 021D1375
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free$InfoLocale_abort
                                          • String ID:
                                          • API String ID: 1663032902-0
                                          • Opcode ID: a9a0ef56855296d69f28970e91aa7ff08aa6ba5c63fbad7abcadd9e72279b5a0
                                          • Instruction ID: 2020cbcbcb471369eaf988269bb0e3654d7f398598dd0eb26e225b36b0039333
                                          • Opcode Fuzzy Hash: a9a0ef56855296d69f28970e91aa7ff08aa6ba5c63fbad7abcadd9e72279b5a0
                                          • Instruction Fuzzy Hash: BE217F72990206FFDF289A29EC41BBB77A9EF45320F10017AED09C6981EB75E940CB50
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free$InfoLocale_abort
                                          • String ID:
                                          • API String ID: 1663032902-0
                                          • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                          • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                          • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                          • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                          • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,021C3F53,?,021D16FE,00000000,?,?,?), ref: 021D101B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                          • Instruction ID: 2a1320bcf30ac01fadc544ad0afc47b8d1d662a738dfdc40304b89c0de45182b
                                          • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                          • Instruction Fuzzy Hash: 33114C3B2003019FDB18AF39D89167AB792FF84358B24443DE94687B40D375B843CB40
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,021D12EF,00000000,00000000,?), ref: 021D157D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale_abort_free
                                          • String ID:
                                          • API String ID: 2692324296-0
                                          • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                          • Instruction ID: e18a114e60b349314860a2ae80c311d2ca6c732eb7b7e5285e992f52fe453f09
                                          • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                          • Instruction Fuzzy Hash: 50F0F936A80216FBDB285A248D05BBB7768EB41314F050569EC0EA3140EB78FD41CAD0
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale_abort_free
                                          • String ID:
                                          • API String ID: 2692324296-0
                                          • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                          • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                          • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                          • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                          • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,021C3F53,?,021D16C2,021C3F53,?,?,?,?,?,021C3F53,?,?), ref: 021D1090
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                          • Instruction ID: 608ef5694d75eea6fc1c325eaa55b71fd9be825902f9112b9e03bd72b5b88907
                                          • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                          • Instruction Fuzzy Hash: D4F04C36340304AFDB246F359C80B7B7B95EF80358F55813CF90587680D3B198028A40
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,021C39B1,?,00000004), ref: 021C7851
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                          • Instruction ID: 74336eb9f43c05cee7b77f142589b614a68e797bfbe9b0b91789140464c2cf1e
                                          • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                          • Instruction Fuzzy Hash: 12F09631A85308BBCB116F609C05F7EBB6ADF14711F10417DFD0556291CBB19A119E9A
                                          APIs
                                            • Part of subcall function 021C4D33: RtlEnterCriticalSection.NTDLL(?), ref: 021C4D42
                                          • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 021C734D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                          • String ID:
                                          • API String ID: 1272433827-0
                                          • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                          • Instruction ID: 73a8dd715ccc6c01f88214b4c853ee2d3c977077ceb53c6110bfb2d9af1a610c
                                          • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                          • Instruction Fuzzy Hash: 0CF04936A90204EFD705EF68E805B9D77B1EB45721F20816AF814DB2E0CB7489819F99
                                          APIs
                                            • Part of subcall function 00444ACC: RtlEnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                                          • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 004470E6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                          • String ID:
                                          • API String ID: 1272433827-0
                                          • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                          • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                          • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                          • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                          • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,021D1720,021C3F53,?,?,?,?,?,021C3F53,?,?,?), ref: 021D0F95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                          • Instruction ID: 3cc6017ebfacce6130b4846ddfa52c01b8a1dc5423bf8e954e68dfc9245d41f9
                                          • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                          • Instruction Fuzzy Hash: 8FF0E53A34020597CB199F35DC45B6ABF94EFC6711F1640A9FA098B691C7759882CB50
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                          • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,004514B9,<D,?,?,?,?,?,00443CEC,?,?,?), ref: 00450D2E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                          • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                          • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                          • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                          APIs
                                          • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,02194814,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,0046673C), ref: 0218E8F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                          • Instruction ID: ae83e27189065ec87ee88a3d16fd5e86ce8f2c446435a227ebaa14b44a3aa9f7
                                          • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                          • Instruction Fuzzy Hash: 9ED09E757442187BEA14A6959C4AEAB7A9CE741B96F100165BA01D72C0EAA0AE048AE1
                                          APIs
                                          • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                          • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                          • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                          • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: recv
                                          • String ID:
                                          • API String ID: 1507349165-0
                                          • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                          • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                          • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                          • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                          • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                          • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                          • Instruction Fuzzy Hash:
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: BG3i@
                                          • API String ID: 0-2407888476
                                          • Opcode ID: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                          • Instruction ID: a817909710d0090f483bb13cdd1d1ee80d6dfae79024daed79820ace932836b2
                                          • Opcode Fuzzy Hash: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                          • Instruction Fuzzy Hash: E361777160070966DA385A2858D6BBF6396EB0DB04F10391BE943FF3C1D61DAD43874E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                          • Instruction ID: 703b79ff713a1f4658d85af1ba3b7429ad9a7344f3e843867653866ecbf45c67
                                          • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                          • Instruction Fuzzy Hash: A45146726C06449FDB3F497894987FF6BB69F02248F18089FD842CB281C705E605C7E2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                          • Instruction ID: f79fa85d0c1d5658f8767083ab66caca7c98cda9bc4d19b1547ccf3d41a23e19
                                          • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                          • Instruction Fuzzy Hash: 8E5167792C064C9FDF3B4A6884547FF2BB69F56349F08081BD886CB291C742D601C7D2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                          • Instruction ID: e47b97b21f836cd03f295ee90de6feb37cae4df0254a032430ab3cefd666e269
                                          • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                          • Instruction Fuzzy Hash: C851AC3160070457DF388A6985DA7BF6B959B0E700F18352FE48AFB382C60DED02979E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                          • Instruction ID: 12df978bf056ba7ce0c19f18808916ee63e51df78eb95e4dd1b4e6c7fdbb82e7
                                          • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                          • Instruction Fuzzy Hash: 124145B59587058FC314CE29C19062BFBE1FBC8344F148A2EF99693394D775AA81CF82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                          • Instruction ID: 4dd25ef8aece06dcbd44762d080e1d81d96ea4c89eb3931c7e752ffea448aa68
                                          • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                          • Instruction Fuzzy Hash: 99417576A083158FC314CE29D18021BFBE1FBC8300F568A2EF99693350D679E980CB86
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: HeapProcess
                                          • String ID:
                                          • API String ID: 54951025-0
                                          • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                          • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                          • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                          • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                                          • Instruction ID: 1fbb2d6a6e610910e1865e113166bba559d0ad1400e2c5ed2b94208389d41108
                                          • Opcode Fuzzy Hash: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                                          • Instruction Fuzzy Hash: 4E323621D2AF014DE7639634C862336A649AFB73C5F19D737F81AB5AA6EB2CC4C34105
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a18e7bb7c2c42d1902aff7cdab2f32fbef15b0e2cf6e19f50b6dfc23c9c72e89
                                          • Instruction ID: fa95849963874bc261e98e72bc7e27ecd54c6dbbf7a289000752bef7c8baf157
                                          • Opcode Fuzzy Hash: a18e7bb7c2c42d1902aff7cdab2f32fbef15b0e2cf6e19f50b6dfc23c9c72e89
                                          • Instruction Fuzzy Hash: 3832D5716887459FDF19DF28C48076AB7E6BF84308F084A2EF8E587281E775D945CB82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f36ab663cb4d239ef1e0a5f108238eabc662f1d3d061ede5d5b4150ec9228ddd
                                          • Instruction ID: 2a34495ee4f42e5442afe8381c33b9994a027dd0bc8bc0cc3fe6fc4803c66e78
                                          • Opcode Fuzzy Hash: f36ab663cb4d239ef1e0a5f108238eabc662f1d3d061ede5d5b4150ec9228ddd
                                          • Instruction Fuzzy Hash: 9732C1796087469BD714DF2AC4807ABB7E1BF84304F444A2EFC958B381D778DD858B8A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                          • Instruction ID: 655fb846ce62bd2350a94ebcbc7417910777bb1d18b132e8dc93699850c3bd36
                                          • Opcode Fuzzy Hash: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                          • Instruction Fuzzy Hash: 1E029E717046518FD328CF2EE890536B7E1AF8A301B46863EE4D5C7391EB34E926CB94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                          • Instruction ID: 022d1978040d43b7ea9bbfc0a41ffb8b00617051ae00cac38c3f572af68edcce
                                          • Opcode Fuzzy Hash: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                          • Instruction Fuzzy Hash: 0D028F717046518FD318CF2EE880536B7E1AF8E301B46863EE585C7395EB74E922CB95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ae54c0c007aacb93a7dd55fc151a9a0813301b4ecfdd70e7c81fd1d8629b8821
                                          • Instruction ID: 2be3fa16bbc459714230ad24859df6633ed55965eaf71897f2cb23332102d2d3
                                          • Opcode Fuzzy Hash: ae54c0c007aacb93a7dd55fc151a9a0813301b4ecfdd70e7c81fd1d8629b8821
                                          • Instruction Fuzzy Hash: 4AF16C756142548FC314DF1DE8A087BB3E5EB8A301B460A2EF1C2D7391DB74EA1ACB56
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                                          • Instruction ID: dd4ce2a6fae4266494c2f053a510589cf36d02151b1693af83bcfdcd1697f2cb
                                          • Opcode Fuzzy Hash: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                                          • Instruction Fuzzy Hash: 55F13B716142548FC314DF1DE89187BB3E0EB8A301B460A2EF5C2D7392DB78E91ADB56
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7363a9fedaeb76f2bf31ad894624b0994c444190ff40f401d8ef5418a52334f3
                                          • Instruction ID: a134442df30985c3d9ded0ed06b90328dea8838589cb671b1bd0994677c35241
                                          • Opcode Fuzzy Hash: 7363a9fedaeb76f2bf31ad894624b0994c444190ff40f401d8ef5418a52334f3
                                          • Instruction Fuzzy Hash: 60D1A171A083158BC721DE29C88096FB7E4FFD8354F446A2EF88597361EB38DD058B86
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                                          • Instruction ID: 309de3b9eed86cc577be3aba55cebfb5e5fca65d6825314ccb74f5b082551f59
                                          • Opcode Fuzzy Hash: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                                          • Instruction Fuzzy Hash: A2B16E7911429A8ACF05EF68C4913F63BA1EF6A300F0851B9EC9CCF756E3358506EB65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                                          • Instruction ID: 86422b113df266cbb8d28aa4d41e6099a1760efb4c6ea83322c03ecd969c618c
                                          • Opcode Fuzzy Hash: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                                          • Instruction Fuzzy Hash: 46B1817951429A8ACB05EF28C4913F63BA1EF6A300F4851B9EC9CCF757D3399506EB24
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                          • Instruction ID: c2ccfb52f11e3b3b259396a7657262a28929e77abe156aeb413db61674ad6f9a
                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                          • Instruction Fuzzy Hash: EB91C8722080A319DB2D463E847403FFFE19A563A1B1BA79FD4F2CB2C5EE18D564D624
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                          • Instruction ID: 4bc7a19b78b3923bd294324807b23a5e70e392b11aa895e474023c0768c286cc
                                          • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                          • Instruction Fuzzy Hash: 1C91B6762080A35ADB2D463AC43403FFFE15A563A1B1B979FD4F2CB2C5EE18C568D624
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                          • Instruction ID: 8cd81e8b6c8cb135a2d00aee0b4681899237c427d703fcd1ed6b13232f465ad6
                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                          • Instruction Fuzzy Hash: 439195722090A35ADB2D463D843403FFFE15E5A3A1B1B979FD4F2CB2C5EE28C5649624
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                          • Instruction ID: 764c5269c97d122d9fe74655f9ee234d35d9baa513617d91c8dfae4030734310
                                          • Opcode Fuzzy Hash: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                          • Instruction Fuzzy Hash: 05616BF12C070896DE3F5A68B895BFF33B5EF41708F48051AE842DB5A1D751E541CB16
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                          • Instruction ID: 0b48b368c5635401337a13b1bd1353bea2dc5e852610c413c362189cac830100
                                          • Opcode Fuzzy Hash: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                          • Instruction Fuzzy Hash: 57618971BC07496BDE3FAA68B891BFE23B9DF09308F140459E947DB290D711D942C709
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                          • Instruction ID: 3f92c48b0efc6548e9d2ace3e3fdbc0fca8b075b553eb95927f683fa27391a83
                                          • Opcode Fuzzy Hash: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                          • Instruction Fuzzy Hash: A4613471E0070867DE385928B896BBF23A8AB0D708F24755BE942DB381D65DDD43C24E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                          • Instruction ID: b40c52ae0115b4061fe2d1036eda9829452ee7622c5651f608d151b30f65a328
                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                          • Instruction Fuzzy Hash: B081C4722090A319DB2D463E843403FFFE15A563A5B1BA7AFD4F2CB2C5EE18C5649624
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                          • Instruction ID: 61f6cd4e2a94a36a6652522188f48ed2bcd63c305fdb574287b7df62abf21a4e
                                          • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                          • Instruction Fuzzy Hash: BB51677170460D9BDB34E96894E77BFA3899B0E344F18350BD882B7382D60CED02939E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                          • Instruction ID: 867975ee2bca74cd76bee40e7a293b18db77e7efc09d1d4f1eaf4d10539abb38
                                          • Opcode Fuzzy Hash: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                          • Instruction Fuzzy Hash: 02615A369483419FC308DF24D581A5FB7E9AFC8714F450E2EF499DA190E770EA098B82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                          • Instruction ID: 42e819d74c2f676ea4fb49a2469d6a41ac5eaf2d1859dcf64078451750f97267
                                          • Opcode Fuzzy Hash: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                          • Instruction Fuzzy Hash: 49614E32A083119FC308DF35E581A5BB7E5FFDC718F550E1EF48996151E674EA088B8A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction ID: cf69843f144d93aaa856178c3564d15d3a29c67fef822ebdb550293bdecf3a70
                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction Fuzzy Hash: 2B110B777C004147D617862EE4B42F7EFB5EEC522A72D4676D0418BBD8D722A247E500
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction ID: d77b428d8deff70f46db9a150fef47e19855adfe796a652afc1ecdf390514463
                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction Fuzzy Hash: D1110BF724C18143EE74862DD8B46B7A795EACE320F2C636BD0C14B758D52A99459908
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390395586.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5b0000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction ID: 3107581f5a1fd6b2f547a8753fcb75ac1328b5c2fd6ebc1880acc18b8e143b56
                                          • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction Fuzzy Hash: E4119A72340104AFDB44DE59DC85FE777EAFB88320B298065ED08CB352E676E802C760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction ID: d67b9e7fab7520545b681291c8a6805b0b5d10f613be528371692bcb0754d33a
                                          • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction Fuzzy Hash: 4D01F7726506088FDF21DF20C855BAB33E5FB89305F1541A4D90697241E370A8458F80
                                          APIs
                                          • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                          • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                            • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                          • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                          • DeleteDC.GDI32(?), ref: 0041805D
                                          • DeleteDC.GDI32(00000000), ref: 00418060
                                          • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                          • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                          • GetCursorInfo.USER32(?), ref: 004180B5
                                          • GetIconInfo.USER32(?,?), ref: 004180CB
                                          • DeleteObject.GDI32(?), ref: 004180FA
                                          • DeleteObject.GDI32(?), ref: 00418107
                                          • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                          • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                          • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                          • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                          • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                          • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                          • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                          • DeleteDC.GDI32(?), ref: 0041827F
                                          • DeleteDC.GDI32(00000000), ref: 00418282
                                          • DeleteObject.GDI32(00000000), ref: 00418285
                                          • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                          • DeleteObject.GDI32(00000000), ref: 00418344
                                          • GlobalFree.KERNEL32(?), ref: 0041834B
                                          • DeleteDC.GDI32(?), ref: 0041835B
                                          • DeleteDC.GDI32(00000000), ref: 00418366
                                          • DeleteDC.GDI32(?), ref: 00418398
                                          • DeleteDC.GDI32(00000000), ref: 0041839B
                                          • DeleteObject.GDI32(?), ref: 004183A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                          • String ID: DISPLAY
                                          • API String ID: 1352755160-865373369
                                          • Opcode ID: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                          • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                          • Opcode Fuzzy Hash: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                          • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                          APIs
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                          • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                          • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                          • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                          • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                          • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                          • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                          • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                          • ResumeThread.KERNEL32(?), ref: 00417582
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                          • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                          • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                          • GetLastError.KERNEL32 ref: 004175C7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                          • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                          • API String ID: 4188446516-3035715614
                                          • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                          • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                          • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                          • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                          APIs
                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                          • ExitProcess.KERNEL32 ref: 0041151D
                                            • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                            • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                            • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                          • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                            • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                            • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                            • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                          • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                          • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                          • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                          • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                            • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                            • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                            • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                          • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                          • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                            • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                          • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                          • API String ID: 4250697656-2665858469
                                          • Opcode ID: b68df8224523070e2f82cd34dc7b2adce00a37accb578c29d62ccc5e9000c55b
                                          • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                          • Opcode Fuzzy Hash: b68df8224523070e2f82cd34dc7b2adce00a37accb578c29d62ccc5e9000c55b
                                          • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                          APIs
                                            • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                            • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                            • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00000000,?,0040C2B0,?,00000000), ref: 0040AFC9
                                            • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                            • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,0040C2B0,?,00000000), ref: 0040AFE3
                                            • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                                          • ExitProcess.KERNEL32 ref: 0040C63E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                          • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                          • API String ID: 1861856835-3168347843
                                          • Opcode ID: 2f5bbe9983b031741b9612b10ea9738e3693b38a5d50ce928d6129f5854bf65a
                                          • Instruction ID: c8b5e11b4abf5c95f8ab28b2bb359051ef64700817c412cd349ec45860bdb676
                                          • Opcode Fuzzy Hash: 2f5bbe9983b031741b9612b10ea9738e3693b38a5d50ce928d6129f5854bf65a
                                          • Instruction Fuzzy Hash: EB9175316042005AC314FB25D852ABF7799AF91718F10453FF98A631E2EF7CAD49C69E
                                          APIs
                                            • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                            • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                            • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00000000,?,0040C2B0,?,00000000), ref: 0040AFC9
                                            • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                            • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,0040C2B0,?,00000000), ref: 0040AFE3
                                            • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                          • ExitProcess.KERNEL32 ref: 0040C287
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                          • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                          • API String ID: 3797177996-1998216422
                                          • Opcode ID: f87e8bfd70f89d72fe36cb7f76ba1a535ecb60285b91f3da220538a46e29fcef
                                          • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                          • Opcode Fuzzy Hash: f87e8bfd70f89d72fe36cb7f76ba1a535ecb60285b91f3da220538a46e29fcef
                                          • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                          APIs
                                          • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                          • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                          • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                          • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                          • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                          • SetEvent.KERNEL32 ref: 0041A38A
                                          • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                          • CloseHandle.KERNEL32 ref: 0041A3AB
                                          • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                          • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                          • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                          • API String ID: 738084811-1408154895
                                          • Opcode ID: 67a24f6113aabf6128109dc61cf26ab2441941a35e225fe1c9d441213504bd5b
                                          • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                          • Opcode Fuzzy Hash: 67a24f6113aabf6128109dc61cf26ab2441941a35e225fe1c9d441213504bd5b
                                          • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                          APIs
                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 0219153B
                                          • ExitProcess.KERNEL32 ref: 02191784
                                            • Part of subcall function 021928C4: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 021928E0
                                            • Part of subcall function 021928C4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 021928F9
                                            • Part of subcall function 021928C4: RegCloseKey.ADVAPI32(?), ref: 02192904
                                            • Part of subcall function 0219B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B89A
                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 021915C2
                                          • OpenProcess.KERNEL32(00100000,00000000,0218E3BB,?,?,?,?,00000000), ref: 021915D1
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 021915DC
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 021915E3
                                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 021915E9
                                            • Part of subcall function 02192A3C: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 02192A4A
                                            • Part of subcall function 02192A3C: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0218BBB3,004660E0,00000001,000000AF,00465554), ref: 02192A65
                                            • Part of subcall function 02192A3C: RegCloseKey.ADVAPI32(?,?,?,?,0218BBB3,004660E0,00000001,000000AF,00465554), ref: 02192A70
                                          • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 0219161A
                                          • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 02191676
                                          • GetTempFileNameW.KERNEL32(?,0046B7CC,00000000,?,?,?,?,?,?,?,?,00000000), ref: 02191690
                                          • lstrcatW.KERNEL32(?,0046B7D8,?,?,?,?,?,?,?,00000000), ref: 021916A2
                                            • Part of subcall function 0219B7F6: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000000,0219B90C,00000000,00000000,?,?,0218A270), ref: 0219B852
                                            • Part of subcall function 0219B7F6: WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,0219B90C,00000000,00000000,?,?,0218A270), ref: 0219B866
                                            • Part of subcall function 0219B7F6: CloseHandle.KERNEL32(00000000,?,00000000,0219B90C,00000000,00000000,?,?,0218A270), ref: 0219B873
                                          • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 0219172B
                                          • OpenProcess.KERNEL32(00100000,00000000,0218E3BB,?,?,?,?,00000000), ref: 02191740
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 0219174B
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 02191752
                                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 02191758
                                            • Part of subcall function 0219B7F6: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0219B90C,00000000,00000000,?), ref: 0219B835
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExistsExitMutexNamePointerQuerySleepWritelstrcat
                                          • String ID: 0DG$@CG$WDH$exepath
                                          • API String ID: 1212092484-1464086911
                                          • Opcode ID: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                                          • Instruction ID: 800e02f25dcafb0f4bbf91610f03ce4c73f5bfa7c3596738671d1a5774432688
                                          • Opcode Fuzzy Hash: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                                          • Instruction Fuzzy Hash: 6051CF71A842067FDF14B7A0AC88EEE336EAB04351F1001A5F915A72D1EF758E818E68
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                          • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                          • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                          • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                          • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                          • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                          • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                          • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                          • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                          • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Write$Create
                                          • String ID: RIFF$WAVE$data$fmt
                                          • API String ID: 1602526932-4212202414
                                          • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                          • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                          • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                          • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                          APIs
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\Wk731bq71c.exe,00000001,004068B2,C:\Users\user\Desktop\Wk731bq71c.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                          • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                          • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                          • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                          • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                          • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                          • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                          • API String ID: 1646373207-2033049377
                                          • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                          • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                          • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                          • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                          APIs
                                          • CreateDCA.GDI32(0046BAC8,00000000,00000000,00000000), ref: 02198220
                                          • CreateCompatibleDC.GDI32(00000000), ref: 0219822B
                                            • Part of subcall function 021986B9: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 021986E9
                                          • CreateCompatibleBitmap.GDI32(?,00000000), ref: 021982AC
                                          • SelectObject.GDI32(00000000,00000000), ref: 021982D2
                                          • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 021982FA
                                          • GetCursorInfo.USER32(?), ref: 0219831C
                                          • GetIconInfo.USER32(?,?), ref: 02198332
                                          • DeleteObject.GDI32(?), ref: 02198361
                                          • DeleteObject.GDI32(?), ref: 0219836E
                                          • DrawIcon.USER32(00000000,?,?,?), ref: 0219837B
                                          • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00471DE4,00000000,00000000,00660046), ref: 021983AB
                                          • GetObjectA.GDI32(?,00000018,?), ref: 021983DA
                                          • LocalAlloc.KERNEL32(00000040,00000028), ref: 02198423
                                          • LocalAlloc.KERNEL32(00000040,00000001), ref: 02198446
                                          • GlobalAlloc.KERNEL32(00000000,?), ref: 021984AF
                                          • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 021984D2
                                          • DeleteObject.GDI32(00000000), ref: 021984EC
                                          • GlobalFree.KERNEL32(00CC0020), ref: 021984F7
                                          • DeleteObject.GDI32(00000000), ref: 021985AB
                                          • GlobalFree.KERNEL32(?), ref: 021985B2
                                          • DeleteObject.GDI32(?), ref: 02198608
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Object$Delete$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                          • String ID:
                                          • API String ID: 615876539-0
                                          • Opcode ID: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                          • Instruction ID: bbf4a70d30ce9e9e69d5a17c7c86fedfc8bae11a8766ef30c4cbda5475d6c477
                                          • Opcode Fuzzy Hash: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                          • Instruction Fuzzy Hash: BFC15871548340AFD7209F24DC44B6BBBE9EF89741F05482DF98A972A1EB30E904CB66
                                          APIs
                                          • lstrlenW.KERNEL32(?), ref: 0219B43D
                                          • _memcmp.LIBVCRUNTIME ref: 0219B455
                                          • lstrlenW.KERNEL32(?), ref: 0219B46E
                                          • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0219B4A9
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0219B4BC
                                          • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0219B500
                                          • lstrcmpW.KERNEL32(?,?), ref: 0219B51B
                                          • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0219B533
                                          • _wcslen.LIBCMT ref: 0219B542
                                          • FindVolumeClose.KERNEL32(?), ref: 0219B562
                                          • GetLastError.KERNEL32 ref: 0219B57A
                                          • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0219B5A7
                                          • lstrcatW.KERNEL32(?,?), ref: 0219B5C0
                                          • lstrcpyW.KERNEL32(?,?), ref: 0219B5CF
                                          • GetLastError.KERNEL32 ref: 0219B5D7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                          • String ID: ?
                                          • API String ID: 3941738427-1684325040
                                          • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                          • Instruction ID: 13168820c5edcf688f256ed88a5b191fbc087ceed2b7b6149d0d74533399e134
                                          • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                          • Instruction Fuzzy Hash: 0441607154C305ABDB21DFA4FC88AAB77ECAF45719F00093AF545C2261EB74C648CB92
                                          APIs
                                          • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                          • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                          • lstrlenW.KERNEL32(?), ref: 0041B207
                                          • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                          • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                          • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                          • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                          • _wcslen.LIBCMT ref: 0041B2DB
                                          • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                          • GetLastError.KERNEL32 ref: 0041B313
                                          • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                          • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                          • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                          • GetLastError.KERNEL32 ref: 0041B370
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                          • String ID: ?
                                          • API String ID: 3941738427-1684325040
                                          • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                          • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                          • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                          • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$EnvironmentVariable$___from_strstr_to_strchr_wcschr
                                          • String ID:
                                          • API String ID: 2719235668-0
                                          • Opcode ID: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                                          • Instruction ID: c6a5a869f14fe5d58722948d5bdb4c0f22c22f3bed23514d6441b2ff32b8db58
                                          • Opcode Fuzzy Hash: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                                          • Instruction Fuzzy Hash: 92D1597DD803407FDB29AF789881B7A7BA99F60324F34417DE94597280EB329A40CF91
                                          APIs
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 021975D3
                                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 021975EB
                                          • GetThreadContext.KERNEL32(?,00000000), ref: 02197601
                                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 02197627
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 021976A7
                                          • TerminateProcess.KERNEL32(?,00000000), ref: 021976BB
                                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 021976F2
                                          • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 021977BF
                                          • SetThreadContext.KERNEL32(?,00000000), ref: 021977DC
                                          • ResumeThread.KERNEL32(?), ref: 021977E9
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 02197801
                                          • GetCurrentProcess.KERNEL32(?), ref: 0219780C
                                          • TerminateProcess.KERNEL32(?,00000000), ref: 02197826
                                          • GetLastError.KERNEL32 ref: 0219782E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                          • String ID: ntdll
                                          • API String ID: 3275803005-3337577438
                                          • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                          • Instruction ID: 0784f6b73d3b7af205363ced5a698462cc56daaf4d655f7441e249f49674e686
                                          • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                          • Instruction Fuzzy Hash: 05A16BB1544304AFDB109F65DC49B6BBBE8FF48349F000829F689C62A1E775E445CF6A
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 021852F5
                                            • Part of subcall function 021B3736: RtlEnterCriticalSection.NTDLL(00470D18), ref: 021B3740
                                            • Part of subcall function 021B3736: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 021B3773
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          • __Init_thread_footer.LIBCMT ref: 02185332
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 0218544E
                                            • Part of subcall function 021B3780: RtlEnterCriticalSection.NTDLL(00470D18), ref: 021B378B
                                            • Part of subcall function 021B3780: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 021B37C8
                                          • Sleep.KERNEL32(0000012C,00000093,?), ref: 021854A6
                                          • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 021854CB
                                          • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 021854F8
                                            • Part of subcall function 021B3B0C: __onexit.LIBCMT ref: 021B3B12
                                          • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 021855F5
                                          • Sleep.KERNEL32(00000064,00000062,00465554), ref: 0218560F
                                          • TerminateProcess.KERNEL32(00000000), ref: 02185628
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterFileInit_thread_footerLeaveProcessSleep$CreateNamedPeekPipeReadTerminateWrite__onexitsend
                                          • String ID: P\G$P\G$P\G$P\G$P\G$cmd.exe
                                          • API String ID: 121539554-3292008770
                                          • Opcode ID: 797804256bd83e4a27056d5b7dd8b844625091c3a01af072158c3512f2156987
                                          • Instruction ID: 1b067865badd34756f5280bc804d262649a0a3423f0afc0ed83fa7088be24dd0
                                          • Opcode Fuzzy Hash: 797804256bd83e4a27056d5b7dd8b844625091c3a01af072158c3512f2156987
                                          • Instruction Fuzzy Hash: B391F9716807047FD716BB24EDC0E6E7BABEB40344F914039F91AAA1A1EF749C448F69
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$EnvironmentVariable$_wcschr
                                          • String ID:
                                          • API String ID: 3899193279-0
                                          • Opcode ID: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                                          • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                          • Opcode Fuzzy Hash: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                                          • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                            • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                          • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                          • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                          • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                          • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                          • Sleep.KERNEL32(00000064), ref: 00412060
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                          • String ID: /stext "$HDG$HDG$>G$>G
                                          • API String ID: 1223786279-3931108886
                                          • Opcode ID: 2965da4d366e691acd172f0cdd04edb3158ce634b227cd42ede08875f2df4c7b
                                          • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                          • Opcode Fuzzy Hash: 2965da4d366e691acd172f0cdd04edb3158ce634b227cd42ede08875f2df4c7b
                                          • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                          APIs
                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                          • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                          • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                          • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                          • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                          • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                          • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                          • API String ID: 2490988753-744132762
                                          • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                          • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                          • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                          • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                          APIs
                                            • Part of subcall function 02191900: TerminateProcess.KERNEL32(00000000,?,0218C8E4), ref: 02191910
                                            • Part of subcall function 02191900: WaitForSingleObject.KERNEL32(000000FF,?,0218C8E4), ref: 02191923
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0218C27A
                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0218C28D
                                            • Part of subcall function 0219AD9F: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,02183CA7), ref: 0219ADC6
                                          • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0218C4E7
                                          • ExitProcess.KERNEL32 ref: 0218C4EE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentDeleteExecuteExitFileModuleNameObjectShellSingleTerminateWait
                                          • String ID: @CG$On Error Resume Next$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$`=G$exepath$fso.DeleteFolder "$pth_unenc$while fso.FileExists("
                                          • API String ID: 508158800-1730539264
                                          • Opcode ID: a33fc09c9556ef91ef2cee6c22be68f1294df09e9ea1a498d22c8dae3f6f7800
                                          • Instruction ID: 63ad382720cae386ae7af40e4ec449e1b3bd0b63a5fcd28a9766b3783208173e
                                          • Opcode Fuzzy Hash: a33fc09c9556ef91ef2cee6c22be68f1294df09e9ea1a498d22c8dae3f6f7800
                                          • Instruction Fuzzy Hash: CB8181316883805FC729FB20D8D0EAF73ABAF91700F60442EE85697194EF759D49CE96
                                          APIs
                                          • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B846
                                          • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B88A
                                          • RegCloseKey.ADVAPI32(?), ref: 0041BB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnumOpen
                                          • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                          • API String ID: 1332880857-3714951968
                                          • Opcode ID: 1ca62804b15d34bcc7d5687c2ed344e0a188a1aaae4f1100116e92e98c2cfeae
                                          • Instruction ID: 4ca6cd9db44c7b11bab16217f2b7ba144dfc64e74838f3250c32f9e768a6938f
                                          • Opcode Fuzzy Hash: 1ca62804b15d34bcc7d5687c2ed344e0a188a1aaae4f1100116e92e98c2cfeae
                                          • Instruction Fuzzy Hash: 8C812E311082449BD324EB11DC51AEFB7E9FFD4314F10493FB58A921E1EF74AA49CA9A
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$Info
                                          • String ID:
                                          • API String ID: 2509303402-0
                                          • Opcode ID: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                          • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                          • Opcode Fuzzy Hash: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                          • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                          • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                          • __aulldiv.LIBCMT ref: 00407FE9
                                          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                          • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                          • CloseHandle.KERNEL32(00000000), ref: 00408200
                                          • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                          • CloseHandle.KERNEL32(00000000), ref: 00408256
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                          • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                          • API String ID: 1884690901-3066803209
                                          • Opcode ID: c2c3dd0b9761f8915acc54d0b888bd8b82482c38814dadf735549f209977c830
                                          • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                          • Opcode Fuzzy Hash: c2c3dd0b9761f8915acc54d0b888bd8b82482c38814dadf735549f209977c830
                                          • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                          APIs
                                            • Part of subcall function 02191900: TerminateProcess.KERNEL32(00000000,?,0218C8E4), ref: 02191910
                                            • Part of subcall function 02191900: WaitForSingleObject.KERNEL32(000000FF,?,0218C8E4), ref: 02191923
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0218C5F2
                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0218C605
                                            • Part of subcall function 0219B7F6: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0219B90C,00000000,00000000,?), ref: 0219B835
                                          • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0218C899
                                          • ExitProcess.KERNEL32 ref: 0218C8A5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileProcess$CreateDeleteExecuteExitModuleNameObjectShellSingleTerminateWait
                                          • String ID: @CG$On Error Resume Next$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$`=G$exepath$fso.DeleteFolder "$while fso.FileExists("
                                          • API String ID: 1359289687-1885488838
                                          • Opcode ID: 4a4176d209088168477d8c341ab9c6af581995fbe5fc9bf84f99647e44242b62
                                          • Instruction ID: d37c1b6d46629be9fd748d5f16d71f5f987dfff8e2badba5b3839ca88854f58a
                                          • Opcode Fuzzy Hash: 4a4176d209088168477d8c341ab9c6af581995fbe5fc9bf84f99647e44242b62
                                          • Instruction Fuzzy Hash: 8791A2316882805EC729FB24D8D0EAF73DBAF90700F50453EE84A971A4EF359D49CE96
                                          APIs
                                          • _wcslen.LIBCMT ref: 0218BEDC
                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0218BEF5
                                          • _wcslen.LIBCMT ref: 0218BFBB
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0218C043
                                          • _wcslen.LIBCMT ref: 0218C09B
                                          • CloseHandle.KERNEL32 ref: 0218C102
                                          • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000001), ref: 0218C120
                                          • ExitProcess.KERNEL32 ref: 0218C137
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _wcslen$CreateDirectory$CloseExecuteExitHandleProcessShell
                                          • String ID: 6$C:\Users\user\Desktop\Wk731bq71c.exe$BG$BG
                                          • API String ID: 3303048660-1016004406
                                          • Opcode ID: 0ce300c52b2574979d2682925cabc15749f3fad58451f58e2d3683bc22aef4dd
                                          • Instruction ID: 31b64f289d59b3c86a8d7428930724376572693caffce9cb104b7df9a9894cd1
                                          • Opcode Fuzzy Hash: 0ce300c52b2574979d2682925cabc15749f3fad58451f58e2d3683bc22aef4dd
                                          • Instruction Fuzzy Hash: ED51E7302883446FDA29B734ACD4F7F279B9F80744F50442EF806961D5EF699905CEAA
                                          APIs
                                          • Sleep.KERNEL32(00001388), ref: 0218A0C9
                                            • Part of subcall function 02189FFE: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0218A0D6), ref: 0218A034
                                            • Part of subcall function 02189FFE: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0218A0D6), ref: 0218A043
                                            • Part of subcall function 02189FFE: Sleep.KERNEL32(00002710,?,?,?,0218A0D6), ref: 0218A070
                                            • Part of subcall function 02189FFE: CloseHandle.KERNEL32(00000000,?,?,?,0218A0D6), ref: 0218A077
                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0218A105
                                          • GetFileAttributesW.KERNEL32(00000000), ref: 0218A116
                                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0218A12D
                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0218A1A7
                                            • Part of subcall function 0219B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B89A
                                          • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0218A2B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                          • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                          • API String ID: 3795512280-3163867910
                                          • Opcode ID: f1eb223cb7d2e6894d1a2c78ceddde7f199078b5105718b7a6d2036e1116f8b0
                                          • Instruction ID: ad492518ce300c0acb0b25378a92701696d9f64aade10411dabe5dfad6e18933
                                          • Opcode Fuzzy Hash: f1eb223cb7d2e6894d1a2c78ceddde7f199078b5105718b7a6d2036e1116f8b0
                                          • Instruction Fuzzy Hash: 69519B316C43845FCB2ABB7098E4ABE739BAF80300F54056DF956A72D4EF359909CE52
                                          APIs
                                          • Sleep.KERNEL32(00001388), ref: 00409E62
                                            • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                            • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                            • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                            • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                          • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                          • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0040A049
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                          • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                          • API String ID: 3795512280-3163867910
                                          • Opcode ID: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                                          • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                          • Opcode Fuzzy Hash: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                                          • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 021D0318
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF567
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF579
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF58B
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF59D
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF5AF
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF5C1
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF5D3
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF5E5
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF5F7
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF609
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF61B
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF62D
                                            • Part of subcall function 021CF54A: _free.LIBCMT ref: 021CF63F
                                          • _free.LIBCMT ref: 021D030D
                                            • Part of subcall function 021C6D2C: HeapFree.KERNEL32(00000000,00000000,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?), ref: 021C6D42
                                            • Part of subcall function 021C6D2C: GetLastError.KERNEL32(?,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?,?), ref: 021C6D54
                                          • _free.LIBCMT ref: 021D032F
                                          • _free.LIBCMT ref: 021D0344
                                          • _free.LIBCMT ref: 021D034F
                                          • _free.LIBCMT ref: 021D0371
                                          • _free.LIBCMT ref: 021D0384
                                          • _free.LIBCMT ref: 021D0392
                                          • _free.LIBCMT ref: 021D039D
                                          • _free.LIBCMT ref: 021D03D5
                                          • _free.LIBCMT ref: 021D03DC
                                          • _free.LIBCMT ref: 021D03F9
                                          • _free.LIBCMT ref: 021D0411
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                          • Instruction ID: 89acac87c036fae977cf0e7605f6855ae3446bc2dc9c3afd1071db0a2d172469
                                          • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                          • Instruction Fuzzy Hash: AD315035684244EFEB61AA3AE844B6B7BEAEF48320F24451DE498D7160DF32EC50CB14
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 004500B1
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                            • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                          • _free.LIBCMT ref: 004500A6
                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                          • _free.LIBCMT ref: 004500C8
                                          • _free.LIBCMT ref: 004500DD
                                          • _free.LIBCMT ref: 004500E8
                                          • _free.LIBCMT ref: 0045010A
                                          • _free.LIBCMT ref: 0045011D
                                          • _free.LIBCMT ref: 0045012B
                                          • _free.LIBCMT ref: 00450136
                                          • _free.LIBCMT ref: 0045016E
                                          • _free.LIBCMT ref: 00450175
                                          • _free.LIBCMT ref: 00450192
                                          • _free.LIBCMT ref: 004501AA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                          • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                          • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                          • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                          APIs
                                          • GetCurrentProcessId.KERNEL32 ref: 021911AC
                                            • Part of subcall function 02192A3C: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 02192A4A
                                            • Part of subcall function 02192A3C: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0218BBB3,004660E0,00000001,000000AF,00465554), ref: 02192A65
                                            • Part of subcall function 02192A3C: RegCloseKey.ADVAPI32(?,?,?,?,0218BBB3,004660E0,00000001,000000AF,00465554), ref: 02192A70
                                          • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 021911E8
                                          • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 0219124D
                                            • Part of subcall function 0219271E: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 0219273E
                                            • Part of subcall function 0219271E: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 0219275C
                                            • Part of subcall function 0219271E: RegCloseKey.ADVAPI32(00000000), ref: 02192767
                                          • CloseHandle.KERNEL32(00000000), ref: 021911F7
                                            • Part of subcall function 0219A8ED: GetLocalTime.KERNEL32(00000000), ref: 0219A907
                                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 021914C1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                          • String ID: 0DG$TTF$WDH$BG
                                          • API String ID: 65172268-1505503698
                                          • Opcode ID: cfd1e48dead6c5d3f6b6817fbfe2d8e6c01e86e7030477cd0b94be603cb5524d
                                          • Instruction ID: 5f8be1575c3e73986c762da0720a90aff605675270cce71451f791a2079658e4
                                          • Opcode Fuzzy Hash: cfd1e48dead6c5d3f6b6817fbfe2d8e6c01e86e7030477cd0b94be603cb5524d
                                          • Instruction Fuzzy Hash: BF71B1326882416FCA15FB70DC91EAF73A6AF91741F50092DF846531E0EF349A49CEA7
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0041912D
                                          • 73525D90.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                          • Sleep.KERNEL32(000003E8), ref: 0041926D
                                          • GetLocalTime.KERNEL32(?), ref: 0041927C
                                          • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep$73525CreateDirectoryH_prologLocalTime
                                          • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                          • API String ID: 751002821-65789007
                                          • Opcode ID: 0a21d7f936e09c33fa5b50dccd88a6c5b43b6b62766088ea18683ea9844d9cf1
                                          • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                          • Opcode Fuzzy Hash: 0a21d7f936e09c33fa5b50dccd88a6c5b43b6b62766088ea18683ea9844d9cf1
                                          • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                          APIs
                                          • connect.WS2_32(?,?,?), ref: 004042A5
                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                          • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                          • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                          • API String ID: 994465650-2151626615
                                          • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                          • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                          • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                          • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                                          APIs
                                            • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                            • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                            • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                            • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                            • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                          • ExitProcess.KERNEL32 ref: 0040C832
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                          • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                          • API String ID: 1913171305-390638927
                                          • Opcode ID: 596688edc73e45a379e005b5df2e4a3f1ce32bf4a5f624f6e5d805fe461fbf63
                                          • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                          • Opcode Fuzzy Hash: 596688edc73e45a379e005b5df2e4a3f1ce32bf4a5f624f6e5d805fe461fbf63
                                          • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                          • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                          • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                          • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                          • closesocket.WS2_32(?), ref: 0040481F
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                          • String ID:
                                          • API String ID: 3658366068-0
                                          • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                          • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                          • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                          • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 021881B3
                                          • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 02188229
                                          • __aulldiv.LIBCMT ref: 02188250
                                          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 02188374
                                          • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 0218838F
                                          • CloseHandle.KERNEL32(00000000), ref: 02188467
                                          • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 02188481
                                          • CloseHandle.KERNEL32(00000000), ref: 021884BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                          • String ID: Uploading file to Controller: $>G
                                          • API String ID: 1884690901-111729153
                                          • Opcode ID: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                                          • Instruction ID: d86640e9dc2aadc06b4ed3d484d13f87e3854a55e9e44830f82f2d089059c735
                                          • Opcode Fuzzy Hash: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                                          • Instruction Fuzzy Hash: 82B170716883809FC625FB24D890BAFB7E6AF84310F50491DF99A52290EF709909CF97
                                          APIs
                                            • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                          • GetLastError.KERNEL32 ref: 00454A96
                                          • __dosmaperr.LIBCMT ref: 00454A9D
                                          • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                          • GetLastError.KERNEL32 ref: 00454AB3
                                          • __dosmaperr.LIBCMT ref: 00454ABC
                                          • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                          • CloseHandle.KERNEL32(?), ref: 00454C26
                                          • GetLastError.KERNEL32 ref: 00454C58
                                          • __dosmaperr.LIBCMT ref: 00454C5F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                          • String ID: H
                                          • API String ID: 4237864984-2852464175
                                          • Opcode ID: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                          • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                          • Opcode Fuzzy Hash: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                          • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 02199394
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 02199452
                                          • Sleep.KERNEL32(000003E8), ref: 021994D4
                                          • GetLocalTime.KERNEL32(?), ref: 021994E3
                                          • Sleep.KERNEL32(00000000,00000018,00000000), ref: 021995CC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep$CreateDirectoryH_prologLocalTime
                                          • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                          • API String ID: 3069631530-65789007
                                          • Opcode ID: a40dca5e55645720ca30496181093a362b70aa5652279529810e28997b425322
                                          • Instruction ID: b89495918f69a50b02f8c6265a3b0574d7f465226dc7ceab91ff5aee15768831
                                          • Opcode Fuzzy Hash: a40dca5e55645720ca30496181093a362b70aa5652279529810e28997b425322
                                          • Instruction Fuzzy Hash: 83519171A802989ECF25BBB4DC94AFE77BAAF45301F404069E84AA7184EF385E45CF51
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 0040A456
                                          • Sleep.KERNEL32(000001F4), ref: 0040A461
                                          • GetForegroundWindow.USER32 ref: 0040A467
                                          • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                          • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                          • Sleep.KERNEL32(000003E8), ref: 0040A574
                                            • Part of subcall function 00409D58: SetEvent.KERNEL32(00000000,?,00000000,0040A91C,00000000), ref: 00409D84
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                          • String ID: [${ User has been idle for $ minutes }$]
                                          • API String ID: 911427763-3954389425
                                          • Opcode ID: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                          • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                          • Opcode Fuzzy Hash: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                          • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 65535$udp
                                          • API String ID: 0-1267037602
                                          • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                          • Instruction ID: ff99235a93329936e3deb01ae98906bc81459ee1ade515a0592ad2fd63ebedc9
                                          • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                          • Instruction Fuzzy Hash: 1941F431288301AFEF249A28D904BBB77E8EF85744F0C093DF9A5D3291E765C842C663
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 65535$udp
                                          • API String ID: 0-1267037602
                                          • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                          • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                          • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                          • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,02181D3F,?,00000050,00465290,00000000), ref: 021B9620
                                          • GetLastError.KERNEL32(?,?,02181D3F,?,00000050,00465290,00000000), ref: 021B962D
                                          • __dosmaperr.LIBCMT ref: 021B9634
                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,02181D3F,?,00000050,00465290,00000000), ref: 021B9660
                                          • GetLastError.KERNEL32(?,?,?,02181D3F,?,00000050,00465290,00000000), ref: 021B966A
                                          • __dosmaperr.LIBCMT ref: 021B9671
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,00465290,00000000,00000000,?,?,?,?,?,?,02181D3F,?), ref: 021B96B4
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,02181D3F,?,00000050,00465290,00000000), ref: 021B96BE
                                          • __dosmaperr.LIBCMT ref: 021B96C5
                                          • _free.LIBCMT ref: 021B96D1
                                          • _free.LIBCMT ref: 021B96D8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                          • String ID:
                                          • API String ID: 2441525078-0
                                          • Opcode ID: 7dca9c723f0a3f3e5eee78a7163c4708e0db19878e5bf6bf14be5ff931373868
                                          • Instruction ID: 1957464b86fe5cea307032478f4880a272edd6819ff737da8166330d4232c6c1
                                          • Opcode Fuzzy Hash: 7dca9c723f0a3f3e5eee78a7163c4708e0db19878e5bf6bf14be5ff931373868
                                          • Instruction Fuzzy Hash: 63317E7188428ABFDB126FB4DC849AE3B7AEF45364F240169FA2056150DB31C951DFA1
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                          • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                          • __dosmaperr.LIBCMT ref: 004393CD
                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                          • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                          • __dosmaperr.LIBCMT ref: 0043940A
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                          • __dosmaperr.LIBCMT ref: 0043945E
                                          • _free.LIBCMT ref: 0043946A
                                          • _free.LIBCMT ref: 00439471
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                          • String ID:
                                          • API String ID: 2441525078-0
                                          • Opcode ID: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                          • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                          • Opcode Fuzzy Hash: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                          • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0$1$2$3$4$5$6$7
                                          • API String ID: 0-3177665633
                                          • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                          • Instruction ID: 6be9dbe48369223330e5ae47c8f4f833e25ffaf09320ad2d4209919b57b6f418
                                          • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                          • Instruction Fuzzy Hash: DD61CE725C9302AEDB14FF20C890AEB77A5BF96711F45480DF592572E1DB349A08CFA2
                                          APIs
                                          • SetEvent.KERNEL32(?,?), ref: 021850D8
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02185188
                                          • TranslateMessage.USER32(?), ref: 02185197
                                          • DispatchMessageA.USER32(?), ref: 021851A2
                                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 0218525A
                                          • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 02185292
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                          • String ID: CloseChat$DisplayMessage$GetMessage
                                          • API String ID: 2956720200-749203953
                                          • Opcode ID: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                                          • Instruction ID: b94c0463c685e01e03e33e57f268e9a7e15e9b6180349fc7dbe0d30da5ddb9a3
                                          • Opcode Fuzzy Hash: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                                          • Instruction Fuzzy Hash: BB4192726842406FCB15FB74DC9486E77EAEB85750F40092CF916871A4EF34DA09CF56
                                          APIs
                                          • SetEvent.KERNEL32(?,?), ref: 00404E71
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                          • TranslateMessage.USER32(?), ref: 00404F30
                                          • DispatchMessageA.USER32(?), ref: 00404F3B
                                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                          • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                          • String ID: CloseChat$DisplayMessage$GetMessage
                                          • API String ID: 2956720200-749203953
                                          • Opcode ID: 0a63ed83fbe9c5d385d67535a7e9cff9d5bbc2722f1675769af491005c74c60a
                                          • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                          • Opcode Fuzzy Hash: 0a63ed83fbe9c5d385d67535a7e9cff9d5bbc2722f1675769af491005c74c60a
                                          • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                          APIs
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 0219718B
                                          • CloseHandle.KERNEL32(00000000), ref: 02197194
                                          • DeleteFileA.KERNEL32(00000000), ref: 021971A3
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 02197157
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                          • String ID: <$@$@FG$@FG$TUF
                                          • API String ID: 1107811701-3315534519
                                          • Opcode ID: c09cddb986173b223f0ae78b0a5cb3d5da982f6b9b7ae30d07bc44f4aa3a3996
                                          • Instruction ID: b8066d8406f169f533cfc77833e83a016cbbe1bb0d5af99d440eb3c84c0b24c5
                                          • Opcode Fuzzy Hash: c09cddb986173b223f0ae78b0a5cb3d5da982f6b9b7ae30d07bc44f4aa3a3996
                                          • Instruction Fuzzy Hash: 0A318A31A802499FCF16FBA4DC95AFEB736AF00300F104169F906660E4EF745A8ACF90
                                          APIs
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                          • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                          • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 00416EF0
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                          • String ID: <$@$@FG$@FG$Temp
                                          • API String ID: 1107811701-2245803885
                                          • Opcode ID: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                                          • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                          • Opcode Fuzzy Hash: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                                          • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                          • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\Wk731bq71c.exe), ref: 00406705
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentProcess
                                          • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                          • API String ID: 2050909247-4145329354
                                          • Opcode ID: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                                          • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                          • Opcode Fuzzy Hash: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                                          • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                          • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                          • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                          • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                          • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                          APIs
                                          • _free.LIBCMT ref: 021C7046
                                            • Part of subcall function 021C6D2C: HeapFree.KERNEL32(00000000,00000000,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?), ref: 021C6D42
                                            • Part of subcall function 021C6D2C: GetLastError.KERNEL32(?,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?,?), ref: 021C6D54
                                          • _free.LIBCMT ref: 021C7052
                                          • _free.LIBCMT ref: 021C705D
                                          • _free.LIBCMT ref: 021C7068
                                          • _free.LIBCMT ref: 021C7073
                                          • _free.LIBCMT ref: 021C707E
                                          • _free.LIBCMT ref: 021C7089
                                          • _free.LIBCMT ref: 021C7094
                                          • _free.LIBCMT ref: 021C709F
                                          • _free.LIBCMT ref: 021C70AD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                          • Instruction ID: 58d09facf091b9f628120635feaf961a1891a9fd8e0a5164c3db04473adfa89f
                                          • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                          • Instruction Fuzzy Hash: 4111537A540148AFCB41EF65E841CA93F7AAF54360B6150A9B9488B161DB32EE50DF84
                                          APIs
                                          • _free.LIBCMT ref: 00446DDF
                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                          • _free.LIBCMT ref: 00446DEB
                                          • _free.LIBCMT ref: 00446DF6
                                          • _free.LIBCMT ref: 00446E01
                                          • _free.LIBCMT ref: 00446E0C
                                          • _free.LIBCMT ref: 00446E17
                                          • _free.LIBCMT ref: 00446E22
                                          • _free.LIBCMT ref: 00446E2D
                                          • _free.LIBCMT ref: 00446E38
                                          • _free.LIBCMT ref: 00446E46
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                          • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                          • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                          • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 02191F01
                                            • Part of subcall function 0219AD9F: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,02183CA7), ref: 0219ADC6
                                            • Part of subcall function 0219791D: CloseHandle.KERNEL32(02183D20,?,?,02183D20,00465324), ref: 02197933
                                            • Part of subcall function 0219791D: CloseHandle.KERNEL32($SF,?,?,02183D20,00465324), ref: 0219793C
                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 021921F8
                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 0219222F
                                          • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 0219226B
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                          • String ID: HDG$HDG$>G$>G
                                          • API String ID: 1937857116-1666402509
                                          • Opcode ID: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                                          • Instruction ID: 665470781cb5493f98c9ae3e86d506e5024575accd54a9634d9badbab4346a29
                                          • Opcode Fuzzy Hash: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                                          • Instruction Fuzzy Hash: FC0225316883815EC73AFB24D8E0BEEB3D6AF94300F54486DE98A47194EF705A49CF52
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Eventinet_ntoa
                                          • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                          • API String ID: 3578746661-4192532303
                                          • Opcode ID: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                                          • Instruction ID: 328810c9dc8a687d41a2610f1c8a051f11a2dcc78be954bdc77e83c978734da9
                                          • Opcode Fuzzy Hash: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                                          • Instruction Fuzzy Hash: 5D51E731A842505FCB19FB38D899A7E36E69F85310F404529E84A872E0EF35AE45CFD6
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Eventinet_ntoa
                                          • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                          • API String ID: 3578746661-4192532303
                                          • Opcode ID: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                                          • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                          • Opcode Fuzzy Hash: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                                          • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                          APIs
                                          • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0219A519
                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0219A555
                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,?,00000000), ref: 0219A566
                                          • SetEvent.KERNEL32 ref: 0219A5F1
                                          • WaitForSingleObject.KERNEL32(000001F4), ref: 0219A602
                                          • CloseHandle.KERNEL32 ref: 0219A612
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Event$CloseCreateExistsFileHandleObjectPathSendSingleStringWait
                                          • String ID: TUF$open "
                                          • API String ID: 1811012380-2979349893
                                          • Opcode ID: afa000e900512d794b59872f8fe6b6e7421b33da501b9bd85e28326864c8fc87
                                          • Instruction ID: 4a7b27b2bbdb0676adad2774527e40112662b2c2ffd698c7b86f20de6ba3ebee
                                          • Opcode Fuzzy Hash: afa000e900512d794b59872f8fe6b6e7421b33da501b9bd85e28326864c8fc87
                                          • Instruction Fuzzy Hash: 1751D1712883456ED625BB34ECC5EBF3B9EDF81744F10003AF855921A4EF209D48CEA6
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 0218A6BD
                                          • Sleep.KERNEL32(000001F4), ref: 0218A6C8
                                          • GetForegroundWindow.USER32 ref: 0218A6CE
                                          • GetWindowTextLengthW.USER32(00000000), ref: 0218A6D7
                                          • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0218A70B
                                          • Sleep.KERNEL32(000003E8), ref: 0218A7DB
                                            • Part of subcall function 02189FBF: SetEvent.KERNEL32(00000000,?,00000000,0218AB83,00000000), ref: 02189FEB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                          • String ID: [${ User has been idle for
                                          • API String ID: 911427763-3934435721
                                          • Opcode ID: 6d776f70f920023e5288755160ba8f24f5da9fa6db96a00e1421ea32c0579234
                                          • Instruction ID: 05b11ab29e92651ace67c1df8fc17e3f12249498ef31c4ea20ef534e6cc4d50a
                                          • Opcode Fuzzy Hash: 6d776f70f920023e5288755160ba8f24f5da9fa6db96a00e1421ea32c0579234
                                          • Instruction Fuzzy Hash: 9951E4316887405FC325FB30D8D4B6EB7A6AF84714F50096EF846872E0EF749A05CE96
                                          APIs
                                          • RtlDecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DecodePointer
                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                          • API String ID: 3527080286-3064271455
                                          • Opcode ID: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                          • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                          • Opcode Fuzzy Hash: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                          • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                          • Sleep.KERNEL32(00000064), ref: 00416688
                                          • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CreateDeleteExecuteShellSleep
                                          • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                          • API String ID: 1462127192-2001430897
                                          • Opcode ID: c5055d1c8fd221ff70b2429fe89847c2a3d4d04500f72c4d4fbc9f5d8f684817
                                          • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                          • Opcode Fuzzy Hash: c5055d1c8fd221ff70b2429fe89847c2a3d4d04500f72c4d4fbc9f5d8f684817
                                          • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                          APIs
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 0219718B
                                          • CloseHandle.KERNEL32(00000000), ref: 02197194
                                          • DeleteFileA.KERNEL32(00000000), ref: 021971A3
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 02197157
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                          • String ID: <$@$@FG$TUF
                                          • API String ID: 1107811701-3349172182
                                          • Opcode ID: b36bc87eb4507af4992a544fbd13103342267bc18c2cc7e8b00c7cda52f17d37
                                          • Instruction ID: e295a6ed566a2f9ced9a1b833fdf5644ccb78165a3368d5dafb4334300e65aa0
                                          • Opcode Fuzzy Hash: b36bc87eb4507af4992a544fbd13103342267bc18c2cc7e8b00c7cda52f17d37
                                          • Instruction Fuzzy Hash: 90315831D802499FDF16FBA0D895AFEB776AF10340F104169F906660E4EF745A8ACF90
                                          APIs
                                          • _strftime.LIBCMT ref: 00401AD3
                                            • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                          • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                          • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                          • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                          • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                          • API String ID: 3809562944-3643129801
                                          • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                          • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                          • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                          • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                          APIs
                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 02181BE2
                                          • waveInOpen.WINMM(00471AF8,000000FF,00471B00,00401A8E,00000000,00000000,00000024), ref: 02181C78
                                          • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 02181CCD
                                          • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 02181CDC
                                          • waveInStart.WINMM ref: 02181CE8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                          • String ID: XCG$`=G$x=G
                                          • API String ID: 1356121797-903574159
                                          • Opcode ID: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                                          • Instruction ID: ce81e07b40507a3580f796e33888fc1b68fc8b1e6ca7ab6ab6e15516780c2993
                                          • Opcode Fuzzy Hash: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                                          • Instruction Fuzzy Hash: DE21B031A413419BC714EF7DBD0595A7BAAFB84342B00883AE10DD76B0EBB49881CF0C
                                          APIs
                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                          • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                          • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                          • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                          • waveInStart.WINMM ref: 00401A81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                          • String ID: XCG$`=G$x=G
                                          • API String ID: 1356121797-903574159
                                          • Opcode ID: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                                          • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                          • Opcode Fuzzy Hash: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                                          • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                            • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                            • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                            • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                          • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                          • lstrcpyn.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                          • Shell_NotifyIcon.SHELL32(00000000,00473B50), ref: 0041C9EF
                                          • TranslateMessage.USER32(?), ref: 0041C9FB
                                          • DispatchMessageA.USER32(?), ref: 0041CA05
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                          • String ID: Remcos
                                          • API String ID: 1970332568-165870891
                                          • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                          • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                          • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                          • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b50f87e948356266a42ac280b2451f101745a062afa0556d4abdae292072cfe6
                                          • Instruction ID: 6c7ddd23d624e0345733d051f3870029751df8a86d9c0a29dc8c6c69eba9efdd
                                          • Opcode Fuzzy Hash: b50f87e948356266a42ac280b2451f101745a062afa0556d4abdae292072cfe6
                                          • Instruction Fuzzy Hash: FDC1D7B8D88249AFCF15DFA8C842BAD7BB5AF29318F24405CE455E7391C7349A41CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                          • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                          • Opcode Fuzzy Hash: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                          • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E03,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BD6
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C59
                                          • __alloca_probe_16.LIBCMT ref: 00452C91
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E03,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CEC
                                          • __alloca_probe_16.LIBCMT ref: 00452D3B
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D03
                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D7F
                                          • __freea.LIBCMT ref: 00452DAA
                                          • __freea.LIBCMT ref: 00452DB6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                          • String ID:
                                          • API String ID: 201697637-0
                                          • Opcode ID: 51fcd5d0f12c7252ccb3cdd53779652c124c35418bee1affee7c5fbc1305f75c
                                          • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                          • Opcode Fuzzy Hash: 51fcd5d0f12c7252ccb3cdd53779652c124c35418bee1affee7c5fbc1305f75c
                                          • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 5328bd0f7edc37ac40c0d0f8fad2384ac8a9632e9013bb03371bda9eca2e0847
                                          • Instruction ID: f664cb24cf6bc497e1c34d839868e93cb1287d671bc7cae01a8c68eb78defa90
                                          • Opcode Fuzzy Hash: 5328bd0f7edc37ac40c0d0f8fad2384ac8a9632e9013bb03371bda9eca2e0847
                                          • Instruction Fuzzy Hash: AA51BE359402499FCB11DB78D840BEEBBF2FF58304F6401ADE895BB251D776A805DB50
                                          APIs
                                            • Part of subcall function 021C7126: GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                            • Part of subcall function 021C7126: _free.LIBCMT ref: 021C715D
                                            • Part of subcall function 021C7126: SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                            • Part of subcall function 021C7126: _abort.LIBCMT ref: 021C71A4
                                          • _memcmp.LIBVCRUNTIME ref: 021C490A
                                          • _free.LIBCMT ref: 021C497B
                                          • _free.LIBCMT ref: 021C4994
                                          • _free.LIBCMT ref: 021C49C6
                                          • _free.LIBCMT ref: 021C49CF
                                          • _free.LIBCMT ref: 021C49DB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorLast$_abort_memcmp
                                          • String ID: C
                                          • API String ID: 1679612858-1037565863
                                          • Opcode ID: 4ee3c7c2bc2adc8e7b8f5f7d65043758b13cb49f9f14cb5bf46d27c87fe2b158
                                          • Instruction ID: 998d7c0b126288912c1c6a74f30bcc67c904a28305dc65978417d2a8df2c3275
                                          • Opcode Fuzzy Hash: 4ee3c7c2bc2adc8e7b8f5f7d65043758b13cb49f9f14cb5bf46d27c87fe2b158
                                          • Instruction Fuzzy Hash: C1B15979A452299FDB28DF18C894BADB7B5FF58304F2045AED849A7350D731AE90CF80
                                          APIs
                                            • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                            • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                            • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                            • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                          • _memcmp.LIBVCRUNTIME ref: 004446A3
                                          • _free.LIBCMT ref: 00444714
                                          • _free.LIBCMT ref: 0044472D
                                          • _free.LIBCMT ref: 0044475F
                                          • _free.LIBCMT ref: 00444768
                                          • _free.LIBCMT ref: 00444774
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorLast$_abort_memcmp
                                          • String ID: C
                                          • API String ID: 1679612858-1037565863
                                          • Opcode ID: b3bb612f52cd01851518acec42876c64f75404bfee4e20e1c1da8053f10e2069
                                          • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                          • Opcode Fuzzy Hash: b3bb612f52cd01851518acec42876c64f75404bfee4e20e1c1da8053f10e2069
                                          • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: tcp$udp
                                          • API String ID: 0-3725065008
                                          • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                          • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                          • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                          • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 02181A23
                                            • Part of subcall function 021B3736: RtlEnterCriticalSection.NTDLL(00470D18), ref: 021B3740
                                            • Part of subcall function 021B3736: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 021B3773
                                          • RtlExitUserThread.NTDLL(00000000), ref: 02181A5B
                                          • waveInUnprepareHeader.WINMM(00001E64,00000020,00000000,?,00000020,00473EE8,00000000), ref: 02181B69
                                            • Part of subcall function 021B3780: RtlEnterCriticalSection.NTDLL(00470D18), ref: 021B378B
                                            • Part of subcall function 021B3780: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 021B37C8
                                            • Part of subcall function 021B3B0C: __onexit.LIBCMT ref: 021B3B12
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepareUser__onexitwave
                                          • String ID: T=G$p[G$>G$>G
                                          • API String ID: 2307665288-2461731529
                                          • Opcode ID: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                          • Instruction ID: 55f85743c8effef953fed40a88c0d44d412597cb0d1391048ad17b21160dd681
                                          • Opcode Fuzzy Hash: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                          • Instruction Fuzzy Hash: D441C7326842405FC326FB28DDD4EBE73A6EB84310F50452EF91D962E0DF30A946CE56
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 004017BC
                                            • Part of subcall function 004334CF: RtlEnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                            • Part of subcall function 004334CF: RtlLeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                          • RtlExitUserThread.KERNEL32(00000000), ref: 004017F4
                                          • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                            • Part of subcall function 00433519: RtlEnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                            • Part of subcall function 00433519: RtlLeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                            • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepareUser__onexitwave
                                          • String ID: T=G$p[G$>G$>G
                                          • API String ID: 2307665288-2461731529
                                          • Opcode ID: e05c2306cfb714febdabc2cba20003dca8f921cff1dc9c3ad302307b41b865ab
                                          • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                          • Opcode Fuzzy Hash: e05c2306cfb714febdabc2cba20003dca8f921cff1dc9c3ad302307b41b865ab
                                          • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 02192F28
                                            • Part of subcall function 02192C11: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 02192C84
                                            • Part of subcall function 02192C11: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 02192CB3
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 02193098
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnumInfoOpenQuerysend
                                          • String ID: TUF$TUFTUF$>G$DG$DG
                                          • API String ID: 3114080316-72097156
                                          • Opcode ID: 09c09115532b36cedb4214abfd7c567596c85741be2dd330b3884bc25d138105
                                          • Instruction ID: 74152982734194f768c832e6a0ccdb572cf390410e69d2f55794af882bea53d8
                                          • Opcode Fuzzy Hash: 09c09115532b36cedb4214abfd7c567596c85741be2dd330b3884bc25d138105
                                          • Instruction Fuzzy Hash: 064186316842806FD329F724E8D4AFF7396EF95340F54842EE94A57290EF349D098EA6
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 02189DA6
                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 02189DB2
                                          • GetKeyboardLayout.USER32(00000000), ref: 02189DB9
                                          • GetKeyState.USER32(00000010), ref: 02189DC3
                                          • GetKeyboardState.USER32(?), ref: 02189DCE
                                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 02189E83
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                          • String ID: 8[G
                                          • API String ID: 3566172867-1691237782
                                          • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                          • Instruction ID: 142feb0d875e93133c1ae63f1528355d8d1a0be690c9cb5c110704adea917281
                                          • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                          • Instruction Fuzzy Hash: 95316F72544308AFD711DF90DC84FEB7BECEB48711F00083ABA45961A0E7B1E548CBA2
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                          • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                          • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                            • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                            • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                          • String ID: .part
                                          • API String ID: 1303771098-3499674018
                                          • Opcode ID: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                          • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                          • Opcode Fuzzy Hash: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                          • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                          APIs
                                            • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                            • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                            • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                            • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                            • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                          • _wcslen.LIBCMT ref: 0041A8F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                          • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                          • API String ID: 3286818993-703403762
                                          • Opcode ID: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                          • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                          • Opcode Fuzzy Hash: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                          • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                          APIs
                                          • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 02189C68
                                          • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 02189C76
                                          • GetLastError.KERNEL32 ref: 02189C82
                                            • Part of subcall function 0219A8ED: GetLocalTime.KERNEL32(00000000), ref: 0219A907
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02189CD2
                                          • TranslateMessage.USER32(?), ref: 02189CE1
                                          • DispatchMessageA.USER32(?), ref: 02189CEC
                                          Strings
                                          • Keylogger initialization failure: error , xrefs: 02189C99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                          • String ID: Keylogger initialization failure: error
                                          • API String ID: 3219506041-952744263
                                          • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                          • Instruction ID: 90cc74906135be3a7bf812f129766b0ba788b04c75e656854e8283c64fb2ec6d
                                          • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                          • Instruction Fuzzy Hash: 0C11BF716443059F8710BB7AAC89E6B77ECAB85B12B10057AFD46C2250FB60D504CFA6
                                          APIs
                                          • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                          • GetConsoleWindow.KERNEL32 ref: 0041BEBF
                                          • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                          • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Console$Window$AllocOutputShow
                                          • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                          • API String ID: 4067487056-2527699604
                                          • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                          • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                          • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                          • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                                          • __alloca_probe_16.LIBCMT ref: 004499E2
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                                          • __alloca_probe_16.LIBCMT ref: 00449AC7
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                          • __freea.LIBCMT ref: 00449B37
                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                          • __freea.LIBCMT ref: 00449B40
                                          • __freea.LIBCMT ref: 00449B65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                          • String ID:
                                          • API String ID: 3864826663-0
                                          • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                          • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                          • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                          • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                          APIs
                                          • SendInput.USER32 ref: 00418B08
                                          • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                          • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                          • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                            • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InputSend$Virtual
                                          • String ID:
                                          • API String ID: 1167301434-0
                                          • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                          • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                          • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                          • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                          APIs
                                          • OpenClipboard.USER32 ref: 00415A46
                                          • EmptyClipboard.USER32 ref: 00415A54
                                          • CloseClipboard.USER32 ref: 00415A5A
                                          • OpenClipboard.USER32 ref: 00415A61
                                          • GetClipboardData.USER32(0000000D), ref: 00415A71
                                          • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                          • CloseClipboard.USER32 ref: 00415A89
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                          • String ID:
                                          • API String ID: 2172192267-0
                                          • Opcode ID: ecacee83990f570dbbeb3f48ef14d28090d1a69e3610d79770c3ad41d7e12a80
                                          • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                          • Opcode Fuzzy Hash: ecacee83990f570dbbeb3f48ef14d28090d1a69e3610d79770c3ad41d7e12a80
                                          • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                          APIs
                                          • _free.LIBCMT ref: 021C8123
                                          • _free.LIBCMT ref: 021C8147
                                          • _free.LIBCMT ref: 021C82CE
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 021C82E0
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 021C8358
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 021C8385
                                          • _free.LIBCMT ref: 021C849A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID:
                                          • API String ID: 314583886-0
                                          • Opcode ID: 15f6b1feb3d3775b51f59aeb9f2b7affb26a76ec7276939fd337acb65b8e2728
                                          • Instruction ID: d1bedb4e6a5cd66a976fb488621a072f4cca5cea9a19b8561270c513dbcb5f80
                                          • Opcode Fuzzy Hash: 15f6b1feb3d3775b51f59aeb9f2b7affb26a76ec7276939fd337acb65b8e2728
                                          • Instruction Fuzzy Hash: 32C14879980205AFDB269F78CC84BAEBBFAEF61310F35416ED48497290E7309E41CB54
                                          APIs
                                          • _free.LIBCMT ref: 00447EBC
                                          • _free.LIBCMT ref: 00447EE0
                                          • _free.LIBCMT ref: 00448067
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                          • _free.LIBCMT ref: 00448233
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID:
                                          • API String ID: 314583886-0
                                          • Opcode ID: 27ecba2f8841fd9bc374cbfe0ae16a2ddc94f833dde90b0adb5aed01379e1676
                                          • Instruction ID: d74e55ca02e924b9256a88f94e7be2aa31ce1fd8fbfcff02d88bcfbefc6cbd9d
                                          • Opcode Fuzzy Hash: 27ecba2f8841fd9bc374cbfe0ae16a2ddc94f833dde90b0adb5aed01379e1676
                                          • Instruction Fuzzy Hash: 32C12871904205ABFB24DF799C41AAE7BB8EF46314F2441AFE484A7351EB388E47C758
                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,021D306A,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 021D2E3D
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,021D306A,00000000,00000000,?,00000001,?,?,?,?), ref: 021D2EC0
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,021D306A,?,021D306A,00000000,00000000,?,00000001,?,?,?,?), ref: 021D2F53
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,021D306A,00000000,00000000,?,00000001,?,?,?,?), ref: 021D2F6A
                                            • Part of subcall function 021C6D66: RtlAllocateHeap.NTDLL(00000000,021B468A,?), ref: 021C6D98
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,021D306A,00000000,00000000,?,00000001,?,?,?,?), ref: 021D2FE6
                                          • __freea.LIBCMT ref: 021D3011
                                          • __freea.LIBCMT ref: 021D301D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                          • String ID:
                                          • API String ID: 2829977744-0
                                          • Opcode ID: 3bf6bddb58e2c22eb2473489dc4132bdb19f64c0de1c03d6ae40a4dd9e1f8fb6
                                          • Instruction ID: 1c59f9c56f0c6ac57d7bb0430c6585b6f054e761cdeaf98d63baf3e75b12aec1
                                          • Opcode Fuzzy Hash: 3bf6bddb58e2c22eb2473489dc4132bdb19f64c0de1c03d6ae40a4dd9e1f8fb6
                                          • Instruction Fuzzy Hash: 7791A272E80256DEDB258F74CC80EEEBBB5AF09714F6846A9EC21E7141D735D840CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: udp
                                          • API String ID: 0-4243565622
                                          • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                          • Instruction ID: 1e89a44bbee2f312142681d78fa34ec3fbfb9104ca70149bc6c8e21ee7ed73e6
                                          • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                          • Instruction Fuzzy Hash: A271CC31A883468FDF29CF18848472BB7E8AF88309F1544BEF8A597291D775CD44CB92
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                          • Instruction ID: 565e77fde825073336ec09fe35b495172205ebae71b7945260a00281e9a6c6bf
                                          • Opcode Fuzzy Hash: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                          • Instruction Fuzzy Hash: D361E539940209EFDB20DF64C841BAABBF6EF54720F24416EED58EB680E7719D42CB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                                          • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                          • Opcode Fuzzy Hash: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                                          • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                          APIs
                                            • Part of subcall function 02190820: SetLastError.KERNEL32(0000000D,02190D9F,?,00000000), ref: 02190826
                                          • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,02190D7C), ref: 02190E2B
                                          • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 02190E91
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 02190E98
                                          • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02190FA6
                                          • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,02190D7C), ref: 02190FD0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$Heap$AllocateInfoNativeProcessSystem
                                          • String ID: A
                                          • API String ID: 4001361727-520424720
                                          • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                          • Instruction ID: 3a8aa96a1444e65c335abc2f7d84eabea33d1fcdd3b7038f4ac08f0bbe919ff0
                                          • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                          • Instruction Fuzzy Hash: 4361C270685301AFCF109F25C980B6A7BEABF8C744F044029FD058B281EBB4E995CBE5
                                          APIs
                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                          • _free.LIBCMT ref: 00444086
                                          • _free.LIBCMT ref: 0044409D
                                          • _free.LIBCMT ref: 004440BC
                                          • _free.LIBCMT ref: 004440D7
                                          • _free.LIBCMT ref: 004440EE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$AllocateHeap
                                          • String ID: J7D
                                          • API String ID: 3033488037-1677391033
                                          • Opcode ID: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                          • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                          • Opcode Fuzzy Hash: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                          • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                          APIs
                                          • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,021CAA9F,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 021CA36C
                                          • __fassign.LIBCMT ref: 021CA3E7
                                          • __fassign.LIBCMT ref: 021CA402
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 021CA428
                                          • WriteFile.KERNEL32(?,FF8BC35D,00000000,021CAA9F,00000000,?,?,?,?,?,?,?,?,?,021CAA9F,?), ref: 021CA447
                                          • WriteFile.KERNEL32(?,?,00000001,021CAA9F,00000000,?,?,?,?,?,?,?,?,?,021CAA9F,?), ref: 021CA480
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: d742a0ed7e7f80d5daee9f90daca0257aad30d4fad8407fa3c2509fb5468b32f
                                          • Instruction ID: 9c117a61714481283aa2aefdbaad7d891c1536f5bd61b028c16a2dfe53c17354
                                          • Opcode Fuzzy Hash: d742a0ed7e7f80d5daee9f90daca0257aad30d4fad8407fa3c2509fb5468b32f
                                          • Instruction Fuzzy Hash: 6151E174E0024D9FCB11CFA8D895AEEBBF9EF19314F28416EE959E7291D7309940CB60
                                          APIs
                                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                          • __fassign.LIBCMT ref: 0044A180
                                          • __fassign.LIBCMT ref: 0044A19B
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                          • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                          • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                          • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                          • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                          • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID: HE$HE
                                          • API String ID: 269201875-1978648262
                                          • Opcode ID: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                                          • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                          • Opcode Fuzzy Hash: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                                          • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                            • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                            • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnumInfoOpenQuerysend
                                          • String ID: TUFTUF$>G$DG$DG
                                          • API String ID: 3114080316-344394840
                                          • Opcode ID: 5329f4943343fd38778cd87648ef360f4b0323ae8cba4f338fa3dca228671b6b
                                          • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                          • Opcode Fuzzy Hash: 5329f4943343fd38778cd87648ef360f4b0323ae8cba4f338fa3dca228671b6b
                                          • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                          APIs
                                            • Part of subcall function 0219B3C2: GetCurrentProcess.KERNEL32(00000003,?,?,0219A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0219B3D3
                                            • Part of subcall function 0219B3C2: IsWow64Process.KERNEL32(00000000,?,?,0219A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0219B3DA
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0218E928
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0218E94C
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0218E95B
                                          • CloseHandle.KERNEL32(00000000), ref: 0218EB12
                                            • Part of subcall function 0219B3EE: OpenProcess.KERNEL32(00000400,00000000), ref: 0219B403
                                            • Part of subcall function 0219B3EE: IsWow64Process.KERNEL32(00000000,?), ref: 0219B40E
                                            • Part of subcall function 0219B5E4: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0219B5FC
                                            • Part of subcall function 0219B5E4: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0219B60F
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0218EB03
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                          • String ID: PgF
                                          • API String ID: 2180151492-654241383
                                          • Opcode ID: 4103c74ef064f91666f8864adad10e095dbae6404165e6ea80ccaa02d20916fc
                                          • Instruction ID: 53b723ecb14ad768bd0f921efec5b2c6fc67176a72e2d86ca231b3a35d79f387
                                          • Opcode Fuzzy Hash: 4103c74ef064f91666f8864adad10e095dbae6404165e6ea80ccaa02d20916fc
                                          • Instruction Fuzzy Hash: CA41E5316882805FC366FB20DD90BEFB7EAEF94301F54456DE94A82190EF309A49CF56
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                          • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                          • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                          • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                          • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                          • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                          APIs
                                          • _strftime.LIBCMT ref: 02181D3A
                                            • Part of subcall function 02181E4F: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 02181EBB
                                          • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 02181DEC
                                          • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 02181E2A
                                          • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 02181E39
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                          • String ID: `=G$x=G
                                          • API String ID: 3809562944-3004145341
                                          • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                          • Instruction ID: d96dca59febd2d2645c0b2a0ea5aaf1c872f5c3d4dbfbc19705176b8056080c1
                                          • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                          • Instruction Fuzzy Hash: B0317E325893809FC325FF24DC95A9E77AABB84300F504839E959821B4EF719A49CF56
                                          APIs
                                            • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                            • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                            • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                          • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                          • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                          • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                          • API String ID: 1133728706-4073444585
                                          • Opcode ID: f18917443f7c6820299f50b24860e0ced39b7309a667dc30009aa6e24bb425c3
                                          • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                          • Opcode Fuzzy Hash: f18917443f7c6820299f50b24860e0ced39b7309a667dc30009aa6e24bb425c3
                                          • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73f4216d9227424834ab683a62f21571e8b2afaadca920fe74bb7b8a40116277
                                          • Instruction ID: 57378a7c62db7d8840935ed572322afa24d10e72dd3295f6393aa55e3333ebde
                                          • Opcode Fuzzy Hash: 73f4216d9227424834ab683a62f21571e8b2afaadca920fe74bb7b8a40116277
                                          • Instruction Fuzzy Hash: F511D676588219FFCB212F769C48D6B7B6FDF85771B610A69F815D7240EB31C801CAA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                          • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                          • Opcode Fuzzy Hash: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                          • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0218FE63
                                          • int.LIBCPMT ref: 0218FE76
                                            • Part of subcall function 0218D147: std::_Lockit::_Lockit.LIBCPMT ref: 0218D158
                                            • Part of subcall function 0218D147: std::_Lockit::~_Lockit.LIBCPMT ref: 0218D172
                                          • std::_Facet_Register.LIBCPMT ref: 0218FEB2
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0218FED8
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0218FEF4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: P[G
                                          • API String ID: 2536120697-571123470
                                          • Opcode ID: 66d1d2f93b0a437ba6194d5bb56da3cbca8cefc802f69fb3ca8fff7099274c15
                                          • Instruction ID: 51505389e25e5364d20b6840d4c585277a5e2af003ec6fab878b60472fd260cd
                                          • Opcode Fuzzy Hash: 66d1d2f93b0a437ba6194d5bb56da3cbca8cefc802f69fb3ca8fff7099274c15
                                          • Instruction Fuzzy Hash: F1110632E80618AFCB15F7A8D890DEEB77A9F40324B614069E809671D0EB709F42CFD5
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                          • int.LIBCPMT ref: 0040FC0F
                                            • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                            • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                          • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: P[G
                                          • API String ID: 2536120697-571123470
                                          • Opcode ID: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                          • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                          • Opcode Fuzzy Hash: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                          • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                          APIs
                                          • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                          • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                          • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                          • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                          • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                          Strings
                                          • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileRead
                                          • String ID: http://geoplugin.net/json.gp
                                          • API String ID: 3121278467-91888290
                                          • Opcode ID: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                          • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                          • Opcode Fuzzy Hash: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                          • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                          APIs
                                            • Part of subcall function 021CFC89: _free.LIBCMT ref: 021CFCB2
                                          • _free.LIBCMT ref: 021CFF90
                                            • Part of subcall function 021C6D2C: HeapFree.KERNEL32(00000000,00000000,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?), ref: 021C6D42
                                            • Part of subcall function 021C6D2C: GetLastError.KERNEL32(?,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?,?), ref: 021C6D54
                                          • _free.LIBCMT ref: 021CFF9B
                                          • _free.LIBCMT ref: 021CFFA6
                                          • _free.LIBCMT ref: 021CFFFA
                                          • _free.LIBCMT ref: 021D0005
                                          • _free.LIBCMT ref: 021D0010
                                          • _free.LIBCMT ref: 021D001B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                          • Instruction ID: 5d33d59f326cdd927024413595f2e3cf8bf8c953e8ff1510093edc29e7dfc73b
                                          • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                          • Instruction Fuzzy Hash: 56118135680B0CBED520B7B0CC05FDB7BAF9F58B20F50081EA699A6851DB77B9094E50
                                          APIs
                                            • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                          • _free.LIBCMT ref: 0044FD29
                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                          • _free.LIBCMT ref: 0044FD34
                                          • _free.LIBCMT ref: 0044FD3F
                                          • _free.LIBCMT ref: 0044FD93
                                          • _free.LIBCMT ref: 0044FD9E
                                          • _free.LIBCMT ref: 0044FDA9
                                          • _free.LIBCMT ref: 0044FDB4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                          • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                          • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                          • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 02190146
                                          • int.LIBCPMT ref: 02190159
                                            • Part of subcall function 0218D147: std::_Lockit::_Lockit.LIBCPMT ref: 0218D158
                                            • Part of subcall function 0218D147: std::_Lockit::~_Lockit.LIBCPMT ref: 0218D172
                                          • std::_Facet_Register.LIBCPMT ref: 02190195
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 021901BB
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 021901D7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: H]G
                                          • API String ID: 2536120697-1717957184
                                          • Opcode ID: 0a2989e8c640b6c3179e3035855110f6a7cb0f7e06d84751caa425ed32edbe19
                                          • Instruction ID: 5c7fb25ef5e04b1f17329361eb1d43485638a2c3fb1058df71b3404d61a7f86c
                                          • Opcode Fuzzy Hash: 0a2989e8c640b6c3179e3035855110f6a7cb0f7e06d84751caa425ed32edbe19
                                          • Instruction Fuzzy Hash: DB11C232980618AFCF15FBA4D9909EDB77A9F54714B204069D8056B1D0EF30EF06CF95
                                          APIs
                                          • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\Wk731bq71c.exe), ref: 00406835
                                            • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                            • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                          • CoUninitialize.OLE32 ref: 0040688E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InitializeObjectUninitialize_wcslen
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                          • API String ID: 3851391207-437439196
                                          • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                          • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                          • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                          • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                          • int.LIBCPMT ref: 0040FEF2
                                            • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                            • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                          • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: H]G
                                          • API String ID: 2536120697-1717957184
                                          • Opcode ID: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                                          • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                          • Opcode Fuzzy Hash: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                                          • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                          APIs
                                          • _wcslen.LIBCMT ref: 021869EF
                                          • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 02186A50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Object_wcslen
                                          • String ID: $$[+] CoGetObject SUCCESS$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                          • API String ID: 240030777-4254711192
                                          • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                          • Instruction ID: 5c69238ac4dd1ea022f22f899f4d84beac197862d46b9d00eb80f03e881f7315
                                          • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                          • Instruction Fuzzy Hash: 961152B2950158AFDB10FBA4D894ADEB7BDDF44710F60406AE905E3140FB789E448EB9
                                          APIs
                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                          • GetLastError.KERNEL32 ref: 0040B2EE
                                          Strings
                                          • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                          • [Chrome Cookies not found], xrefs: 0040B308
                                          • UserProfile, xrefs: 0040B2B4
                                          • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DeleteErrorFileLast
                                          • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                          • API String ID: 2018770650-304995407
                                          • Opcode ID: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                          • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                          • Opcode Fuzzy Hash: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                          • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0219CBEF
                                            • Part of subcall function 0219CC86: RegisterClassExA.USER32(00000030), ref: 0219CCD3
                                            • Part of subcall function 0219CC86: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0219CCEE
                                            • Part of subcall function 0219CC86: GetLastError.KERNEL32 ref: 0219CCF8
                                          • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0219CC26
                                          • lstrcpyn.KERNEL32(00473B68,0046C104,00000080), ref: 0219CC40
                                          • Shell_NotifyIcon.SHELL32(00000000,00473B50), ref: 0219CC56
                                          • TranslateMessage.USER32(?), ref: 0219CC62
                                          • DispatchMessageA.USER32(?), ref: 0219CC6C
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0219CC79
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                          • String ID:
                                          • API String ID: 1970332568-0
                                          • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                          • Instruction ID: 37639e5c878e8248ddc55d775f718242c3e379be3878b178ac4e6c394a314b0b
                                          • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                          • Instruction Fuzzy Hash: 9B0144B1904348ABD7109FA5EC4CEDB7BBCA745B16F004035F645E3062D7B8A245DB69
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe$Rmc-I7G983$BG
                                          • API String ID: 0-2642976657
                                          • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                          • Instruction ID: 1c57291ed466a5066f4e8b6a1f6648646874a0f9ba0cede37b399008ad673652
                                          • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                          • Instruction Fuzzy Hash: E7F090B0BD13509FDB303B346D98B69364EE78079AF004476F90AD72A1EB7488418E88
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe$Rmc-I7G983$BG
                                          • API String ID: 0-2642976657
                                          • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                          • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                          • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                          • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                          APIs
                                          • __allrem.LIBCMT ref: 021B99F0
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 021B9A0C
                                          • __allrem.LIBCMT ref: 021B9A23
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 021B9A41
                                          • __allrem.LIBCMT ref: 021B9A58
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 021B9A76
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1992179935-0
                                          • Opcode ID: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                                          • Instruction ID: 602795d489ccb05e7cd79b8da98e7a3351155a0584667b57f95802454e1f7d45
                                          • Opcode Fuzzy Hash: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                                          • Instruction Fuzzy Hash: 36812B76A80B06AFEB269E78CC41BEA73BAAF45724F24453DE611D76C0E770D5028F50
                                          APIs
                                          • __allrem.LIBCMT ref: 00439789
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                          • __allrem.LIBCMT ref: 004397BC
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                          • __allrem.LIBCMT ref: 004397F1
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1992179935-0
                                          • Opcode ID: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                                          • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                          • Opcode Fuzzy Hash: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                                          • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                          APIs
                                          • _free.LIBCMT ref: 021C2DCF
                                          • _free.LIBCMT ref: 021C2DE9
                                          • _free.LIBCMT ref: 021C2DF4
                                          • _free.LIBCMT ref: 021C2EC8
                                          • _free.LIBCMT ref: 021C2EE4
                                            • Part of subcall function 021BAABB: IsProcessorFeaturePresent.KERNEL32(00000017,021BAA8D,?,?,02181BC9,?,?,00000000,?,?,021BAAAD,00000000,00000000,00000000,00000000,00000000), ref: 021BAABD
                                            • Part of subcall function 021BAABB: GetCurrentProcess.KERNEL32(C0000417), ref: 021BAADF
                                            • Part of subcall function 021BAABB: TerminateProcess.KERNEL32(00000000), ref: 021BAAE6
                                          • _free.LIBCMT ref: 021C2EEE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$Process$CurrentFeaturePresentProcessorTerminate
                                          • String ID:
                                          • API String ID: 2329545287-0
                                          • Opcode ID: 4118d0c7a5faff20c3bdd9400e50d9846731c96832acf5071bf3a173b9413d13
                                          • Instruction ID: 426110d47d1f0c74ef3b289e8d9ba3d8a458a803a82ea331b04c8276fe7ec50e
                                          • Opcode Fuzzy Hash: 4118d0c7a5faff20c3bdd9400e50d9846731c96832acf5071bf3a173b9413d13
                                          • Instruction Fuzzy Hash: F3519C7E5842156FDB289F789840BBAB7A9DFA5724F34405EEC44AB240EB339D02C690
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,021C9E08,00000001,00000001,00000006), ref: 021C9C11
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,?,?,?,021C9E08,00000001,00000001,00000006), ref: 021C9C97
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,00000006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 021C9D91
                                          • __freea.LIBCMT ref: 021C9D9E
                                            • Part of subcall function 021C6D66: RtlAllocateHeap.NTDLL(00000000,021B468A,?), ref: 021C6D98
                                          • __freea.LIBCMT ref: 021C9DA7
                                          • __freea.LIBCMT ref: 021C9DCC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                          • String ID:
                                          • API String ID: 1414292761-0
                                          • Opcode ID: a4f5f7d7e0253137201d24c54ea4cf660dd43f3a14d4cde2709bba3cbd133d87
                                          • Instruction ID: fe34ad4992e73a7c8a2b92500f0522bf2cfeb81ad4e00e7226a24279d5a30252
                                          • Opcode Fuzzy Hash: a4f5f7d7e0253137201d24c54ea4cf660dd43f3a14d4cde2709bba3cbd133d87
                                          • Instruction Fuzzy Hash: E2510576680216AFDB258F64CC41EBF77AAEF50754F25062CFC14E6140EB36EC50CAA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __cftoe
                                          • String ID:
                                          • API String ID: 4189289331-0
                                          • Opcode ID: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                          • Instruction ID: 3b7abbdedecf36baddb5f81e19938440c4766e20a746036b5c430ddb7f9368f8
                                          • Opcode Fuzzy Hash: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                          • Instruction Fuzzy Hash: DB51277A988205AFDB259B688C50EEF77BAEFA9734F31411DF814D6181EB35C900CA60
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __cftoe
                                          • String ID:
                                          • API String ID: 4189289331-0
                                          • Opcode ID: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                                          • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                          • Opcode Fuzzy Hash: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                                          • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$Info
                                          • String ID:
                                          • API String ID: 2509303402-0
                                          • Opcode ID: 15c1efeab650589001bcb3423f25e61575b515edc70c88f8593ca702e347ec5e
                                          • Instruction ID: f4f6b7a58497c00d5ca4d100f58b7040907448ac2f8f66729b925a0f4d6b080e
                                          • Opcode Fuzzy Hash: 15c1efeab650589001bcb3423f25e61575b515edc70c88f8593ca702e347ec5e
                                          • Instruction Fuzzy Hash: 75518EB4940305BEEB219FA5C881BEEBBFAFF58305F64402DE599B2241D775A8408F21
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16
                                          • String ID: a/p$am/pm
                                          • API String ID: 3509577899-3206640213
                                          • Opcode ID: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                          • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                          • Opcode Fuzzy Hash: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                          • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 021840F1
                                            • Part of subcall function 02184234: __EH_prolog.LIBCMT ref: 02184239
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: H_prologSleep
                                          • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                          • API String ID: 3469354165-462540288
                                          • Opcode ID: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                                          • Instruction ID: c7bd5992c1e1e42aa00264cd9c43e33938e2e376f05d8ea545dcc66b6f873fbe
                                          • Opcode Fuzzy Hash: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                                          • Instruction Fuzzy Hash: 8141D631BC82419FCB19FB78D894A6D37A39F45740F004529E819976E4EF34AA46CF8B
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 00403E8A
                                            • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: H_prologSleep
                                          • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                          • API String ID: 3469354165-462540288
                                          • Opcode ID: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                                          • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                          • Opcode Fuzzy Hash: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                                          • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 02186E9F
                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0), ref: 02186EE7
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          • CloseHandle.KERNEL32(00000000), ref: 02186F27
                                          • MoveFileW.KERNEL32(00000000,00000000), ref: 02186F44
                                          • CloseHandle.KERNEL32(00000000,00000057,?,00000008), ref: 02186F6F
                                          • DeleteFileW.KERNEL32(00000000), ref: 02186F7F
                                            • Part of subcall function 021847C2: WaitForSingleObject.KERNEL32(?,000000FF,?,?,02184875,00000000,?,?), ref: 021847D1
                                            • Part of subcall function 021847C2: SetEvent.KERNEL32(?,?,?,02184875,00000000,?,?), ref: 021847EF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                          • String ID:
                                          • API String ID: 1303771098-0
                                          • Opcode ID: 7cdf14121b30b943d831dc041884720089c76492bcd48607f22f732c73577ab1
                                          • Instruction ID: 79040e7a5fd609147f6f290d5dbd907d13bc5a3f7d439c775f555f6421ff2043
                                          • Opcode Fuzzy Hash: 7cdf14121b30b943d831dc041884720089c76492bcd48607f22f732c73577ab1
                                          • Instruction Fuzzy Hash: 70317E715883859FC220FF20DD94DAFB7ADFB84751F40492EF985A2150DB74AA48CFA2
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011), ref: 02199EFB
                                          • OpenServiceW.ADVAPI32(00000000,00000000,000F003F), ref: 02199F12
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 02199F1F
                                          • ControlService.ADVAPI32(00000000,00000001,?), ref: 02199F2E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$Open$CloseControlHandleManager
                                          • String ID:
                                          • API String ID: 1243734080-0
                                          • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                          • Instruction ID: 5982cb3572ac0a27a3b5c914d1253fc772c6316d9bc32b81a93d9ac044b013be
                                          • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                          • Instruction Fuzzy Hash: F1118632585218AFDB116B64EC88EBF7FACDB45AA2B000039F906921D1DB64CD06DAB1
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                          • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                          • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                          • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                          • String ID:
                                          • API String ID: 493672254-0
                                          • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                          • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                          • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                          • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                          APIs
                                          • GetLastError.KERNEL32(?,?,021B8064,021B7A18), ref: 021B807B
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 021B8089
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 021B80A2
                                          • SetLastError.KERNEL32(00000000,?,021B8064,021B7A18), ref: 021B80F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                          • Instruction ID: 209a22420b1beb371bf2ea79c3a31b799edd518fdb9984603887b076a9d267f3
                                          • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                          • Instruction Fuzzy Hash: 11018832599312AEE7262774BC887D7267DFF01BB5B210339F618951E0EF1148419A44
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                          • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                          • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                          • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                          • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                          APIs
                                          • GetLastError.KERNEL32(?,021BE4C7,021B9583,021BE4C7,00475B70,?,021BBBBC,FF8BC35D,00475B70,00473EE8), ref: 021C712A
                                          • _free.LIBCMT ref: 021C715D
                                          • _free.LIBCMT ref: 021C7185
                                          • SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C7192
                                          • SetLastError.KERNEL32(00000000,FF8BC35D,00475B70,00473EE8), ref: 021C719E
                                          • _abort.LIBCMT ref: 021C71A4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                          • Instruction ID: 3dc6a7e01ad8c5d6426b7df774f1a2951994640cc173f658d72630042a6c05b2
                                          • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                          • Instruction Fuzzy Hash: 8CF0813D1C47506AC65632356C09E2E666E9BE17A2B35012CF568D23E4EFA188438D55
                                          APIs
                                          • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                          • _free.LIBCMT ref: 00446EF6
                                          • _free.LIBCMT ref: 00446F1E
                                          • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                          • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                          • _abort.LIBCMT ref: 00446F3D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                          • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                          • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                          • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                          • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                          • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                          • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                          • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                          • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                          • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                          • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                          • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                          • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                          • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                          • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                          APIs
                                          • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Enum$InfoQueryValue
                                          • String ID: [regsplt]$DG
                                          • API String ID: 3554306468-1089238109
                                          • Opcode ID: b52cf5ed435f93dd7af51ec4dffd003f9fb644ce640f232c4502558c4df5ccf7
                                          • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                          • Opcode Fuzzy Hash: b52cf5ed435f93dd7af51ec4dffd003f9fb644ce640f232c4502558c4df5ccf7
                                          • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                          APIs
                                            • Part of subcall function 02191900: TerminateProcess.KERNEL32(00000000,?,0218C8E4), ref: 02191910
                                            • Part of subcall function 02191900: WaitForSingleObject.KERNEL32(000000FF,?,0218C8E4), ref: 02191923
                                            • Part of subcall function 021928C4: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 021928E0
                                            • Part of subcall function 021928C4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 021928F9
                                            • Part of subcall function 021928C4: RegCloseKey.ADVAPI32(?), ref: 02192904
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0218C92E
                                          • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0218CA8D
                                          • ExitProcess.KERNEL32 ref: 0218CA99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                          • String ID: @CG$exepath
                                          • API String ID: 1913171305-1253070338
                                          • Opcode ID: 7fefd4fcae7e0ef6d55ce9d204f1d3822a483be89a92adb2579d4a357fc0ee6e
                                          • Instruction ID: 7f6aee68b6f7cf9bf8bd981c1274a89fc5eafe8260357420b2edd8207fa2f075
                                          • Opcode Fuzzy Hash: 7fefd4fcae7e0ef6d55ce9d204f1d3822a483be89a92adb2579d4a357fc0ee6e
                                          • Instruction Fuzzy Hash: 1B4162329841585ECB2AFB60DCD0EFE737AAF50700F50016AE806A7194EF305E8ACE95
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Wk731bq71c.exe,00000104), ref: 021C297B
                                          • _free.LIBCMT ref: 021C2A46
                                          • _free.LIBCMT ref: 021C2A50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe$`&~
                                          • API String ID: 2506810119-1106480681
                                          • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                          • Instruction ID: 66aa65d3b4fa13eee6b39b56b9751d88bf6f9ba509706a9e2e9fecf6e06f50a2
                                          • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                          • Instruction Fuzzy Hash: 97319375A80258AFDB35DF99DC84E9EBBFDEBA5320F20406AEC0597210D7709E41CB50
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Wk731bq71c.exe,00000104), ref: 00442714
                                          • _free.LIBCMT ref: 004427DF
                                          • _free.LIBCMT ref: 004427E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe$`&~
                                          • API String ID: 2506810119-1106480681
                                          • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                          • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                          • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                          • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                          APIs
                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 021940ED
                                          • LoadLibraryA.KERNEL32(?), ref: 0219412F
                                          • LoadLibraryA.KERNEL32(?), ref: 0219418E
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 021941B6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LibraryLoad$AddressDirectoryProcSystem
                                          • String ID: g<A
                                          • API String ID: 4217395396-3237022798
                                          • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                          • Instruction ID: 22edc61ea901dc9e16f6ccea9f3540bc24506bb4ce95f80056f461ca84b56469
                                          • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                          • Instruction Fuzzy Hash: 6131E7B5946315ABD720EB24DC48E9F77DCEF44794F040A39E854A3200E774E9418FEA
                                          APIs
                                            • Part of subcall function 00433519: RtlEnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                            • Part of subcall function 00433519: RtlLeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                            • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                          • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                            • Part of subcall function 004334CF: RtlEnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                            • Part of subcall function 004334CF: RtlLeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                          • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                          • API String ID: 2974294136-753205382
                                          • Opcode ID: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                          • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                          • Opcode Fuzzy Hash: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                          • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                          APIs
                                          • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                          • wsprintfW.USER32 ref: 0040A905
                                            • Part of subcall function 00409D58: SetEvent.KERNEL32(00000000,?,00000000,0040A91C,00000000), ref: 00409D84
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EventLocalTimewsprintf
                                          • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                          • API String ID: 1497725170-248792730
                                          • Opcode ID: cd67797fddddf3375813783c3d3921fc9f3a7b27cc5fb702b7af122e0a3f8f1e
                                          • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                          • Opcode Fuzzy Hash: cd67797fddddf3375813783c3d3921fc9f3a7b27cc5fb702b7af122e0a3f8f1e
                                          • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0218A0D6), ref: 0218A034
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0218A0D6), ref: 0218A043
                                          • Sleep.KERNEL32(00002710,?,?,?,0218A0D6), ref: 0218A070
                                          • CloseHandle.KERNEL32(00000000,?,?,?,0218A0D6), ref: 0218A077
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleSizeSleep
                                          • String ID: `AG
                                          • API String ID: 1958988193-3058481221
                                          • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                          • Instruction ID: 102d729fde3e94466e21e3089c53f838ebf3365c70a2547dd224c9b663d61d59
                                          • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                          • Instruction Fuzzy Hash: BC110D307847406FD731B7649CD8A3E3B56AF89315F44052AF18582591C761A8C4CF59
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                          • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                          • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleSizeSleep
                                          • String ID: `AG
                                          • API String ID: 1958988193-3058481221
                                          • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                          • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                          • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                          • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                                          APIs
                                          • RegisterClassExA.USER32(00000030), ref: 0219CCD3
                                          • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0219CCEE
                                          • GetLastError.KERNEL32 ref: 0219CCF8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ClassCreateErrorLastRegisterWindow
                                          • String ID: 0$MsgWindowClass
                                          • API String ID: 2877667751-2410386613
                                          • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                          • Instruction ID: 517c51cbd111048d751a8428770bb96a9c15bf64d791e1915d4b3fc75d896666
                                          • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                          • Instruction Fuzzy Hash: 76010CB1D1431EAB8B01DFD9DDC49EFBBBDFE49255B50453AF410B2100E7705A448BA4
                                          APIs
                                          • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                          • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                          • GetLastError.KERNEL32 ref: 0041CA91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ClassCreateErrorLastRegisterWindow
                                          • String ID: 0$MsgWindowClass
                                          • API String ID: 2877667751-2410386613
                                          • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                          • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                          • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                          • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                          APIs
                                          • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                          • CloseHandle.KERNEL32(?), ref: 00406A0F
                                          • CloseHandle.KERNEL32(?), ref: 00406A14
                                          Strings
                                          • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                          • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandle$CreateProcess
                                          • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                          • API String ID: 2922976086-4183131282
                                          • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                          • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                          • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                          • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                          APIs
                                          • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 021929E6
                                          • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0218E832,pth_unenc,004742E0), ref: 02192A14
                                          • RegCloseKey.ADVAPI32(?,?,0218E832,pth_unenc,004742E0), ref: 02192A1F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: pth_unenc$BG
                                          • API String ID: 1818849710-2233081382
                                          • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                          • Instruction ID: a21a43b4509dac14fa9353ea43f23d3010361affdcc16c504a94ecd34a956dcb
                                          • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                          • Instruction Fuzzy Hash: 91F06D72580218BFDF11ABA0ED95FEE37ADEB01B80F104524F902A60A1E731DA04DE50
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                          • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                          • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                          • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                          APIs
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                          • String ID: KeepAlive | Disabled
                                          • API String ID: 2993684571-305739064
                                          • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                          • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                          • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                          • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                          APIs
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                          • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                          • Sleep.KERNEL32(00002710), ref: 00419F79
                                          • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: PlaySound$HandleLocalModuleSleepTime
                                          • String ID: Alarm triggered
                                          • API String ID: 614609389-2816303416
                                          • Opcode ID: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                                          • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                          • Opcode Fuzzy Hash: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                                          • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                          • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                          • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                          • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                          Strings
                                          • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Console$AttributeText$BufferHandleInfoScreen
                                          • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                          • API String ID: 3024135584-2418719853
                                          • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                          • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                          • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                          • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e2c0e9d55fcd13551ec2678028d06ddb1c515a5452d77a18986bab3fa9fe77ab
                                          • Instruction ID: 947d729469174badf8ab9d876f674c572ff993fb523662e619b11a8ed6f22540
                                          • Opcode Fuzzy Hash: e2c0e9d55fcd13551ec2678028d06ddb1c515a5452d77a18986bab3fa9fe77ab
                                          • Instruction Fuzzy Hash: 1C71D539D85226DFCB21DF94C884ABFBB75EF69764F34422DE86167180D7708941CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                          • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                          • Opcode Fuzzy Hash: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                          • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                          APIs
                                            • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                          • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                          • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                          • RtlAllocateHeap.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                          • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                          • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$Heap$AllocateInfoNativeProcessSystem
                                          • String ID:
                                          • API String ID: 4001361727-0
                                          • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                          • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                          • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                          • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$AllocateHeap
                                          • String ID:
                                          • API String ID: 3033488037-0
                                          • Opcode ID: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                          • Instruction ID: b6c773a89608d6e1e7be8ca30ac3d13891bb9b87b7e3aab9e69752f124c3bf16
                                          • Opcode Fuzzy Hash: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                          • Instruction Fuzzy Hash: B451C33AA44218AFDB20DF69E851BAA77F5FFA8724F24056DE849D7250E731D901CB80
                                          APIs
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 021C82E0
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 021C8358
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 021C8385
                                          • _free.LIBCMT ref: 021C82CE
                                            • Part of subcall function 021C6D2C: HeapFree.KERNEL32(00000000,00000000,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?), ref: 021C6D42
                                            • Part of subcall function 021C6D2C: GetLastError.KERNEL32(?,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?,?), ref: 021C6D54
                                          • _free.LIBCMT ref: 021C849A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                          • String ID:
                                          • API String ID: 1286116820-0
                                          • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                          • Instruction ID: 40148281381cd6012cc1b3a782ab16c263b5fae7378a75836d43054e92a01b01
                                          • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                          • Instruction Fuzzy Hash: 77510579940209EFCB25EF69DCC09AEB7BDEF50760B31126EE458932A0E7709D41CB54
                                          APIs
                                            • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                            • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                          • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                            • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                            • Part of subcall function 0041B187: IsWow64Process.KERNEL32(00000000,?,?,?,00474358), ref: 0041B1A7
                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 2180151492-0
                                          • Opcode ID: 165f493bf974e569623c5481e64b25ab41867f369ce00337397d1c391466503a
                                          • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                          • Opcode Fuzzy Hash: 165f493bf974e569623c5481e64b25ab41867f369ce00337397d1c391466503a
                                          • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                          • Instruction ID: 138dac1a5b2372905a720e170f36657ca8f35faa0ff8d4298fb0628b30f2f414
                                          • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                          • Instruction Fuzzy Hash: 3A41C736A402149FCB24DF78C881B5EB7B6EF88714B2585ADD525EB391DB31ED01CB80
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                          • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                          • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                          • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53), ref: 0044FF20
                                          • __alloca_probe_16.LIBCMT ref: 0044FF58
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?), ref: 0044FFA9
                                          • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?,00000002,?), ref: 0044FFBB
                                          • __freea.LIBCMT ref: 0044FFC4
                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                          • String ID:
                                          • API String ID: 313313983-0
                                          • Opcode ID: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                          • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                          • Opcode Fuzzy Hash: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                          • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 021CE3AB
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 021CE3CE
                                            • Part of subcall function 021C6D66: RtlAllocateHeap.NTDLL(00000000,021B468A,?), ref: 021C6D98
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 021CE3F4
                                          • _free.LIBCMT ref: 021CE407
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 021CE416
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                          • String ID:
                                          • API String ID: 336800556-0
                                          • Opcode ID: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                          • Instruction ID: 43c6169040d573243563a3d5011f137cb1328148fb1938ab33c9447e80fe7190
                                          • Opcode Fuzzy Hash: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                          • Instruction Fuzzy Hash: A8017C6A6457557F27211ABA6C8CC7B6E6DDADAEA5325013DFD04C2201EB71CC02C5B1
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                            • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                          • _free.LIBCMT ref: 0044E1A0
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                          • String ID:
                                          • API String ID: 336800556-0
                                          • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                          • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                          • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                          • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                          APIs
                                          • GetLastError.KERNEL32(?,00000000,00000000,021BAA29,00000000,?,?,021BAAAD,00000000,00000000,00000000,00000000,00000000,00000000,02182E6F,?), ref: 021C71AF
                                          • _free.LIBCMT ref: 021C71E4
                                          • _free.LIBCMT ref: 021C720B
                                          • SetLastError.KERNEL32(00000000), ref: 021C7218
                                          • SetLastError.KERNEL32(00000000), ref: 021C7221
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                          • Instruction ID: b77b5d584f4f8576c71709018bdbd3264fb3ebe99bb351fb9a4b481747c86754
                                          • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                          • Instruction Fuzzy Hash: E401D63E1C47006B821626357C48A2F6A6EDBE1771735003DF468D22D5DFA1C8038D14
                                          APIs
                                          • GetLastError.KERNEL32(?,00000000,00000000,0043A7C2,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08,?), ref: 00446F48
                                          • _free.LIBCMT ref: 00446F7D
                                          • _free.LIBCMT ref: 00446FA4
                                          • SetLastError.KERNEL32(00000000), ref: 00446FB1
                                          • SetLastError.KERNEL32(00000000), ref: 00446FBA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                          • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                          • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                          • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                          APIs
                                          • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0219B5FC
                                          • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0219B60F
                                          • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0219B62F
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0219B63A
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0219B642
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandleOpen$FileImageName
                                          • String ID:
                                          • API String ID: 2951400881-0
                                          • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                          • Instruction ID: c9dbcfc6bce7b42bce53334cad2797bf5d00df9fb91389ede9247e27eab49c61
                                          • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                          • Instruction Fuzzy Hash: 92F07D712883056BDB10A394BC49F77B26DDB84B96F010075F612D21A1EFB0DD814AA5
                                          APIs
                                          • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                          • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                          • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B3C8
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseHandleOpen$FileImageName
                                          • String ID:
                                          • API String ID: 2951400881-0
                                          • Opcode ID: 29f25fe7c428bb8e36c62213e2e32091f53e61b5722c7d68a1af70e0c1d4baa5
                                          • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                          • Opcode Fuzzy Hash: 29f25fe7c428bb8e36c62213e2e32091f53e61b5722c7d68a1af70e0c1d4baa5
                                          • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                          APIs
                                          • _free.LIBCMT ref: 021CFA1C
                                            • Part of subcall function 021C6D2C: HeapFree.KERNEL32(00000000,00000000,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?), ref: 021C6D42
                                            • Part of subcall function 021C6D2C: GetLastError.KERNEL32(?,?,021CFCB7,?,00000000,?,00000000,?,021CFF5B,?,00000007,?,?,021D046C,?,?), ref: 021C6D54
                                          • _free.LIBCMT ref: 021CFA2E
                                          • _free.LIBCMT ref: 021CFA40
                                          • _free.LIBCMT ref: 021CFA52
                                          • _free.LIBCMT ref: 021CFA64
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                          • Instruction ID: a8389082e844ac2fd4e062d9cd88acb287beec64528566abb5cb8bb662c2522c
                                          • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                          • Instruction Fuzzy Hash: 83F01236585244AF8664DB65F885C16B7EFEA607247B4581EF048D7960C732FCC1CA54
                                          APIs
                                          • _free.LIBCMT ref: 0044F7B5
                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                          • _free.LIBCMT ref: 0044F7C7
                                          • _free.LIBCMT ref: 0044F7D9
                                          • _free.LIBCMT ref: 0044F7EB
                                          • _free.LIBCMT ref: 0044F7FD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                          • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                          • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                          • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                          APIs
                                          • _free.LIBCMT ref: 00443305
                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                          • _free.LIBCMT ref: 00443317
                                          • _free.LIBCMT ref: 0044332A
                                          • _free.LIBCMT ref: 0044333B
                                          • _free.LIBCMT ref: 0044334C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                          • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                          • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                          • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                          APIs
                                          • GetWindowThreadProcessId.USER32(?,?), ref: 021969CF
                                          • GetWindowTextW.USER32(?,?,0000012C), ref: 02196A01
                                          • IsWindowVisible.USER32(?), ref: 02196A08
                                            • Part of subcall function 0219B5E4: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0219B5FC
                                            • Part of subcall function 0219B5E4: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0219B60F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessWindow$Open$TextThreadVisible
                                          • String ID: (FG
                                          • API String ID: 3142014140-2273637114
                                          • Opcode ID: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                          • Instruction ID: dc7205e7b7e23c29bf3c14e54bbcd9cfd3293dfec1ecde4f892753cc46f268b7
                                          • Opcode Fuzzy Hash: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                          • Instruction Fuzzy Hash: 6771E9711882805FC376FB60D9E0EEFB3A6EF94300F54496DE99A42194EF305A4ACF52
                                          APIs
                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                          • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                          • IsWindowVisible.USER32(?), ref: 004167A1
                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                            • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessWindow$Open$TextThreadVisible
                                          • String ID: (FG
                                          • API String ID: 3142014140-2273637114
                                          • Opcode ID: ce75e1190e9fd0167dfa7796a787b8039ca6e78c287ed818ad397d91960ad8ff
                                          • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                          • Opcode Fuzzy Hash: ce75e1190e9fd0167dfa7796a787b8039ca6e78c287ed818ad397d91960ad8ff
                                          • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                          APIs
                                          • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 02192C84
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 02192CB3
                                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 02192D54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Enum$InfoQueryValue
                                          • String ID: DG
                                          • API String ID: 3554306468-2560412334
                                          • Opcode ID: bddf4943656ecba2bd9c39908ecfff909f44732c8dc369bfccc853cd4406e952
                                          • Instruction ID: 955bbc0fa335d3e458521b76158915e23545e5fc7c97633951fdf5fbc5d7b28c
                                          • Opcode Fuzzy Hash: bddf4943656ecba2bd9c39908ecfff909f44732c8dc369bfccc853cd4406e952
                                          • Instruction Fuzzy Hash: BF510F72148344AFD311EB60DC80DABB7EDEF84744F50492EFA9692150EB74EA09CF62
                                          APIs
                                          • _strpbrk.LIBCMT ref: 021CD70F
                                          • _free.LIBCMT ref: 021CD82C
                                            • Part of subcall function 021BAABB: IsProcessorFeaturePresent.KERNEL32(00000017,021BAA8D,?,?,02181BC9,?,?,00000000,?,?,021BAAAD,00000000,00000000,00000000,00000000,00000000), ref: 021BAABD
                                            • Part of subcall function 021BAABB: GetCurrentProcess.KERNEL32(C0000417), ref: 021BAADF
                                            • Part of subcall function 021BAABB: TerminateProcess.KERNEL32(00000000), ref: 021BAAE6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                          • String ID: *?$.
                                          • API String ID: 2812119850-3972193922
                                          • Opcode ID: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                                          • Instruction ID: 7e4615880cd52c0f39854bdde948d0b27ba1696dbafd62b56869cf2c21afc9bf
                                          • Opcode Fuzzy Hash: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                                          • Instruction Fuzzy Hash: 23519E79E44209AFDF14CFA8D880AADBBB6EF98714F25817DD854E7340E7319A01CB50
                                          APIs
                                          • _strpbrk.LIBCMT ref: 0044D4A8
                                          • _free.LIBCMT ref: 0044D5C5
                                            • Part of subcall function 0043A854: IsProcessorFeaturePresent.KERNEL32(00000017,0043A826,?,?,00401962,?,?,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000), ref: 0043A856
                                            • Part of subcall function 0043A854: GetCurrentProcess.KERNEL32(C0000417), ref: 0043A878
                                            • Part of subcall function 0043A854: TerminateProcess.KERNEL32(00000000), ref: 0043A87F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                          • String ID: *?$.
                                          • API String ID: 2812119850-3972193922
                                          • Opcode ID: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                                          • Instruction ID: 2d4433a3afc190a5690657b280c6536bac4d5ba0d1806d6c31be7b1549e3be36
                                          • Opcode Fuzzy Hash: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                                          • Instruction Fuzzy Hash: 7251B371E00109AFEF14DFA9C881AAEB7F5EF58318F24416FE854E7301DA799E018B54
                                          APIs
                                          • GetKeyboardLayoutNameA.USER32(?), ref: 02189868
                                            • Part of subcall function 02184458: socket.WS2_32(00000000,00000001,00000006), ref: 02184479
                                            • Part of subcall function 021844F3: connect.WS2_32(?,00000000,00000000), ref: 0218450C
                                            • Part of subcall function 0219B911: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,021898F0,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0219B926
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                          • String ID: XCG$`AG$>G
                                          • API String ID: 2334542088-2372832151
                                          • Opcode ID: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                          • Instruction ID: b12ad03b887d1426680bb9def52b8d508431395c36fd9d076bf25d647d16ee26
                                          • Opcode Fuzzy Hash: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                          • Instruction Fuzzy Hash: 625104316882805FC36AFB24D9E4AFFB3D6EF94300F54492DE94A47190EF309A4ACE55
                                          APIs
                                          • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                            • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                            • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                            • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                            • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                          • String ID: XCG$`AG$>G
                                          • API String ID: 2334542088-2372832151
                                          • Opcode ID: cd78294fe739dd1ffd868db09d0fc6556cb04d590f29b38d56dab74e11da72bd
                                          • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                          • Opcode Fuzzy Hash: cd78294fe739dd1ffd868db09d0fc6556cb04d590f29b38d56dab74e11da72bd
                                          • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                          APIs
                                          • connect.WS2_32(?,00000000,00000000), ref: 0218450C
                                          • WSAGetLastError.WS2_32(?,?,?,02181B92), ref: 0218464E
                                            • Part of subcall function 0219A8ED: GetLocalTime.KERNEL32(00000000), ref: 0219A907
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastLocalTimeconnect
                                          • String ID: Connection Failed: $TLS Handshake... |
                                          • API String ID: 227477821-1510355367
                                          • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                          • Instruction ID: ff410c73df44d60e64446146e8cfeae89d70b2ec14612d779b53bf7f3235351f
                                          • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                          • Instruction Fuzzy Hash: E9412870BC0702BF8A18B77D8C96A3D7A57AF41340F600159D90287691FF61E8248FE7
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,0046559C,0046BA00,00000000,00000000,00000000), ref: 021968C3
                                            • Part of subcall function 0219B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B89A
                                          • Sleep.KERNEL32(00000064), ref: 021968EF
                                          • DeleteFileW.KERNEL32(00000000), ref: 02196923
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CreateDeleteExecuteShellSleep
                                          • String ID: /t
                                          • API String ID: 1462127192-3161277685
                                          • Opcode ID: bb2c0f94cc430c17f8d99c3ea8886f75899e052070629971ff6dc793af8fbd9b
                                          • Instruction ID: a90e62926bcbde62998e0c18aa2a6a5d48ae94a75b8be90973d1ea3adb585209
                                          • Opcode Fuzzy Hash: bb2c0f94cc430c17f8d99c3ea8886f75899e052070629971ff6dc793af8fbd9b
                                          • Instruction Fuzzy Hash: EE3180319802599EDF19FBA0DCD1EEEB73AEF10304F504069E906671D0EF706A8ACE95
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                            • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                            • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                            • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                          • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                          • String ID: /sort "Visit Time" /stext "$8>G
                                          • API String ID: 368326130-2663660666
                                          • Opcode ID: 8a80582b666344f58c35e94b8d42b2b9a1cc76ffb3c9451a36ee2e215a9436b9
                                          • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                          • Opcode Fuzzy Hash: 8a80582b666344f58c35e94b8d42b2b9a1cc76ffb3c9451a36ee2e215a9436b9
                                          • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                          APIs
                                          • CreateThread.KERNEL32(00000000,00000000,004099A9,004740F8,00000000,00000000), ref: 0040992A
                                          • CreateThread.KERNEL32(00000000,00000000,00409993,004740F8,00000000,00000000), ref: 0040993A
                                          • CreateThread.KERNEL32(00000000,00000000,004099B5,004740F8,00000000,00000000), ref: 00409946
                                            • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                            • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateThread$LocalTimewsprintf
                                          • String ID: Offline Keylogger Started
                                          • API String ID: 465354869-4114347211
                                          • Opcode ID: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                          • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                          • Opcode Fuzzy Hash: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                          • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                          APIs
                                          • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0218AAEB
                                          • wsprintfW.USER32 ref: 0218AB6C
                                            • Part of subcall function 02189FBF: SetEvent.KERNEL32(00000000,?,00000000,0218AB83,00000000), ref: 02189FEB
                                          Strings
                                          • [%04i/%02i/%02i %02i:%02i:%02i , xrefs: 0218AAF4
                                          • Offline Keylogger Started, xrefs: 0218AAE4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EventLocalTimewsprintf
                                          • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started
                                          • API String ID: 1497725170-184404310
                                          • Opcode ID: d5ceb195e9b1766e7296a956330388e17a452e3f282c8842e463cd6a29e782c0
                                          • Instruction ID: 0f70769ac5df3924223752ae36bfe12854ab12d56d52d391e2d7f5fac921d2e9
                                          • Opcode Fuzzy Hash: d5ceb195e9b1766e7296a956330388e17a452e3f282c8842e463cd6a29e782c0
                                          • Instruction Fuzzy Hash: 61118672444118BECB19FB64EC94CFE77BEAF44351B10012AF80296194FF785A86CEB5
                                          APIs
                                            • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                            • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          • CreateThread.KERNEL32(00000000,00000000,00409993,?,00000000,00000000), ref: 0040A691
                                          • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 0040A69D
                                          • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateThread$LocalTime$wsprintf
                                          • String ID: Online Keylogger Started
                                          • API String ID: 112202259-1258561607
                                          • Opcode ID: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                          • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                          • Opcode Fuzzy Hash: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                          • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                          APIs
                                          • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                          • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                          • __dosmaperr.LIBCMT ref: 0044AAFE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseErrorHandleLast__dosmaperr
                                          • String ID: `@
                                          • API String ID: 2583163307-951712118
                                          • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                          • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                          • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                          • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 02184BAD
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 02184BFB
                                          • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 02184C0E
                                          Strings
                                          • KeepAlive | Enabled | Timeout: , xrefs: 02184BC3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Create$EventLocalThreadTime
                                          • String ID: KeepAlive | Enabled | Timeout:
                                          • API String ID: 2532271599-1507639952
                                          • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                          • Instruction ID: 9201915b61ff05602a8dba7d52b77ffc58949a3e348053fa7e4ea1a136e762dc
                                          • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                          • Instruction Fuzzy Hash: C311E0719442A57FCB21BB7A8888BDB7FACAF46364F00406AF40942151DB789489CFF2
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 00404946
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                          • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                          Strings
                                          • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Create$EventLocalThreadTime
                                          • String ID: KeepAlive | Enabled | Timeout:
                                          • API String ID: 2532271599-1507639952
                                          • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                          • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                          • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                          • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                          APIs
                                            • Part of subcall function 0219B3C2: GetCurrentProcess.KERNEL32(00000003,?,?,0219A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0219B3D3
                                            • Part of subcall function 0219B3C2: IsWow64Process.KERNEL32(00000000,?,?,0219A6D8,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0219B3DA
                                            • Part of subcall function 0219277A: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 0219279E
                                            • Part of subcall function 0219277A: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 021927BB
                                            • Part of subcall function 0219277A: RegCloseKey.ADVAPI32(?), ref: 021927C6
                                          • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0219A740
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseCurrentOpenQueryValueWow64
                                          • String ID: (32 bit)$ (64 bit)$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                          • API String ID: 782494840-214125106
                                          • Opcode ID: 6ae090941000325c3c897e8fa024b5b50426e295cbf2c4f387652279544f3053
                                          • Instruction ID: 4bd415bf7f77fa0b92f4ed4406e7c5e13a2ccdf7d7e7fdc83b4f7b8d8e3fb3db
                                          • Opcode Fuzzy Hash: 6ae090941000325c3c897e8fa024b5b50426e295cbf2c4f387652279544f3053
                                          • Instruction Fuzzy Hash: 66112970A802452EDB09B3649C9BE7F766FDB90300F544439E911D31D1EB648F468BE6
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                          • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                          • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEventHandleObjectSingleWait
                                          • String ID: Connection Timeout
                                          • API String ID: 2055531096-499159329
                                          • Opcode ID: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                          • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                          • Opcode Fuzzy Hash: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                          • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                            • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                            • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                          • String ID: bad locale name
                                          • API String ID: 3628047217-1405518554
                                          • Opcode ID: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                                          • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                          • Opcode Fuzzy Hash: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                                          • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                          APIs
                                          • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 02192948
                                          • RegSetValueExA.ADVAPI32(004655B0,0046BE08,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0219BEAD,0046BE08,004655B0,00000001,00473EE8,00000000), ref: 02192970
                                          • RegCloseKey.ADVAPI32(004655B0,?,?,0219BEAD,0046BE08,004655B0,00000001,00473EE8,00000000,?,02187C44,00000001), ref: 0219297B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: Control Panel\Desktop
                                          • API String ID: 1818849710-27424756
                                          • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                          • Instruction ID: 2ceb1115e5fffebc918fc394de8ceeea9354fe35bb6c633189d27b3bd309e1da
                                          • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                          • Instruction Fuzzy Hash: 1CF06D32580114FFDF01AFA0EC54EEA77A9EF00750B104224BE06A61A1EB319E04DE50
                                          APIs
                                          • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                          • RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                          • RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: Control Panel\Desktop
                                          • API String ID: 1818849710-27424756
                                          • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                          • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                          • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                          • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID: T=G$T=G$wkE
                                          • API String ID: 3519838083-2195589345
                                          • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                          • Instruction ID: e7954d294932043b67e9790224752f06ac2b0e835c2249ebda3469a35d411d7d
                                          • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                          • Instruction Fuzzy Hash: D8F0E971B40190AFCB2ABB6488C0A5EB776DF41324F10C26AEC55B72A0CB794D05CF66
                                          APIs
                                          • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 02192A4A
                                          • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0218BBB3,004660E0,00000001,000000AF,00465554), ref: 02192A65
                                          • RegCloseKey.ADVAPI32(?,?,?,?,0218BBB3,004660E0,00000001,000000AF,00465554), ref: 02192A70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: TUF
                                          • API String ID: 1818849710-3431404234
                                          • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                          • Instruction ID: f9552feb6a38311500a15e86e4f405153279951658579ba398b7a2f1210e091d
                                          • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                          • Instruction Fuzzy Hash: 3BE03072540204BBEF219BA09C05FDA3BACEB04B95F004060FA05E6191D371CE04D794
                                          APIs
                                          • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                          • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                          • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: TUF
                                          • API String ID: 1818849710-3431404234
                                          • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                          • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                          • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                          • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExecuteShell
                                          • String ID: /C $cmd.exe$open
                                          • API String ID: 587946157-3896048727
                                          • Opcode ID: e854ed12d2b02a6b258dd66cbff63ff161655326defcfb2065191564e731d21d
                                          • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                          • Opcode Fuzzy Hash: e854ed12d2b02a6b258dd66cbff63ff161655326defcfb2065191564e731d21d
                                          • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                          APIs
                                          • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                          • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: GetCursorInfo$User32.dll
                                          • API String ID: 1646373207-2714051624
                                          • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                          • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                          • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                          • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                          APIs
                                          • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                          • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: GetLastInputInfo$User32.dll
                                          • API String ID: 2574300362-1519888992
                                          • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                          • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                          • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                          • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __alldvrm$_strrchr
                                          • String ID:
                                          • API String ID: 1036877536-0
                                          • Opcode ID: 34a4a8fdb2fbaed24085f9f51e48c21e05a0faa9b4c0d03c29d10533be22c836
                                          • Instruction ID: bfbf3422220c58eff545f793267cdf4839daeaa1c2481b783394421d9367d081
                                          • Opcode Fuzzy Hash: 34a4a8fdb2fbaed24085f9f51e48c21e05a0faa9b4c0d03c29d10533be22c836
                                          • Instruction Fuzzy Hash: A8A18B7A9803869FDB26CF68C8917BEBBE5EF65360F3841ADD4959B381C3348941CB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __alldvrm$_strrchr
                                          • String ID:
                                          • API String ID: 1036877536-0
                                          • Opcode ID: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                                          • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                          • Opcode Fuzzy Hash: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                                          • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                          APIs
                                          • RegOpenKeyExA.ADVAPI32(80000002,0046BD30,00000000,00020019,?), ref: 0219BAAD
                                          • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0219BAF1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EnumOpen
                                          • String ID:
                                          • API String ID: 3231578192-0
                                          • Opcode ID: c129c5d3b2225b1f8cda05c9a3a6c18510288d4317852ec5d704d9b0c7986d58
                                          • Instruction ID: 360e16cea736fd7a06f77fc9ef8447c41be4d6000aa02ecce2c1ef18972606b0
                                          • Opcode Fuzzy Hash: c129c5d3b2225b1f8cda05c9a3a6c18510288d4317852ec5d704d9b0c7986d58
                                          • Instruction Fuzzy Hash: 1C8110311482449FC765FB20D890FEFB3E9AF94704F10492EE99682194EF31AA49CE97
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                                          • Instruction ID: f422e416fa603e1093aa03255bd19e3eb8e3a61850d229d09553031d8302de67
                                          • Opcode Fuzzy Hash: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                                          • Instruction Fuzzy Hash: A0414D35AC0A04FFDB256B7C8C88ABE3B7BEF51374FA40619F424D6290D77189419A71
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                          • Instruction ID: 0f266053794dd5f7fd91113b752741108d1df54531a25322c74c576fa0c9c557
                                          • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                          • Instruction Fuzzy Hash: 534128B5AC0704FFD7259F78C804BAA7BFAEF98710F20856EE115DB681D772A5408B80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                          • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                          • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                          • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                          APIs
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 021849DF
                                          • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 021849F3
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 021849FE
                                          • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 02184A07
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                          • String ID:
                                          • API String ID: 3360349984-0
                                          • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                          • Instruction ID: ea41958656597888424cf70c0fb7b376ccb41ed486cae4a549382f8a5e20f153
                                          • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                          • Instruction Fuzzy Hash: 10418471684341AFC716FB60DD94D7FB7EEAF85310F140A5DF89682290DF3099098E52
                                          APIs
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                          • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                          • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                          • String ID:
                                          • API String ID: 3360349984-0
                                          • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                          • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                          • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                          • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000006,?,00000000,00000000,?,?,?,?,00000001,?,00000006,00000001,?,?), ref: 021D0187
                                          • MultiByteToWideChar.KERNEL32(?,00000001,00000006,?,00000000,?,?,?,?,00000001,?,00000006,00000001,?,?,?), ref: 021D0210
                                          • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,00000006,00000001,?,?,?,00000002,?), ref: 021D0222
                                          • __freea.LIBCMT ref: 021D022B
                                            • Part of subcall function 021C6D66: RtlAllocateHeap.NTDLL(00000000,021B468A,?), ref: 021C6D98
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                          • String ID:
                                          • API String ID: 2652629310-0
                                          • Opcode ID: d6883ffe4d8719f2de826ec879274d1cc3acae2ccbd5fd9a5eba82e14a7f8a2b
                                          • Instruction ID: b7fd76b694a98965678aad8d71118654619cbd762b4a76cb594634512faf136c
                                          • Opcode Fuzzy Hash: d6883ffe4d8719f2de826ec879274d1cc3acae2ccbd5fd9a5eba82e14a7f8a2b
                                          • Instruction Fuzzy Hash: 9931AB72A4120AEFDB259FA4DC84EFE7BAAEF48714F054169FC14D6250E735C950CBA0
                                          APIs
                                          Strings
                                          • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                          • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep
                                          • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                          • API String ID: 3472027048-1236744412
                                          • Opcode ID: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                          • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                          • Opcode Fuzzy Hash: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                          • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                          APIs
                                            • Part of subcall function 021928C4: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 021928E0
                                            • Part of subcall function 021928C4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 021928F9
                                            • Part of subcall function 021928C4: RegCloseKey.ADVAPI32(?), ref: 02192904
                                          • Sleep.KERNEL32(00000BB8), ref: 0219182A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpenQuerySleepValue
                                          • String ID: @CG$exepath$BG
                                          • API String ID: 4119054056-3221201242
                                          • Opcode ID: 820c01e33afeab3fc0483e6c9ee435281bf1bbf0289cdfb463ea79f6631d800d
                                          • Instruction ID: 60ddf98e0d5b79a015cb511628720ca20ed81561916c45e8a2f844ec88e4002f
                                          • Opcode Fuzzy Hash: 820c01e33afeab3fc0483e6c9ee435281bf1bbf0289cdfb463ea79f6631d800d
                                          • Instruction Fuzzy Hash: 2221E2A1BC03442FDA25B7381C44ABF728F8BC1354F00457AED1AD72C6EF3999058AA5
                                          APIs
                                            • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                            • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                            • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                          • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpenQuerySleepValue
                                          • String ID: @CG$exepath$BG
                                          • API String ID: 4119054056-3221201242
                                          • Opcode ID: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                          • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                          • Opcode Fuzzy Hash: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                          • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                          APIs
                                          • SetEvent.KERNEL32(?,?), ref: 021850D8
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02185188
                                          • TranslateMessage.USER32(?), ref: 02185197
                                          • DispatchMessageA.USER32(?), ref: 021851A2
                                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 0218525A
                                          • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 02185292
                                            • Part of subcall function 021846CF: send.WS2_32(?,00000000,00000000,00000000), ref: 02184764
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                          • String ID:
                                          • API String ID: 2956720200-0
                                          • Opcode ID: 822d3e8355dfe554be3e3a6cb7f23e7c77d447b8df2c12cbc1a70b6fed0e93d0
                                          • Instruction ID: 008fa5f86f03b5afeaddcd96b376dd0448fd129999d8eb9f8234bf250e571ae0
                                          • Opcode Fuzzy Hash: 822d3e8355dfe554be3e3a6cb7f23e7c77d447b8df2c12cbc1a70b6fed0e93d0
                                          • Instruction Fuzzy Hash: CA2171725443416FCA15FB74DD89CAE7BAAEB85710F800A28F92283194EF35D609CF52
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: SystemTimes$Sleep__aulldiv
                                          • String ID:
                                          • API String ID: 188215759-0
                                          • Opcode ID: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                          • Instruction ID: ca843e4944e190259738eaa7202e97cbfacd3f5d618ae10b4de140f0eab6022e
                                          • Opcode Fuzzy Hash: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                          • Instruction Fuzzy Hash: 9821FB725083459FC704EF68D98489FB7E9EFC8654F044A2EF58597250EA34EA09CBA2
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: SystemTimes$Sleep__aulldiv
                                          • String ID:
                                          • API String ID: 188215759-0
                                          • Opcode ID: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                          • Instruction ID: 3b66203fd79088dfadce72ddbf0b0401c54eb4bd27628439374ba0e7aa9136f0
                                          • Opcode Fuzzy Hash: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                          • Instruction Fuzzy Hash: 9D215E725083009BC304DF65D98589FB7E8EFC8654F044A2EF589D3251EA34EA49CB63
                                          APIs
                                            • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                            • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                            • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                          • Sleep.KERNEL32(000001F4), ref: 00409C95
                                          • Sleep.KERNEL32(00000064), ref: 00409D1F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Window$SleepText$ForegroundLength
                                          • String ID: [ $ ]
                                          • API String ID: 3309952895-93608704
                                          • Opcode ID: a99961e6875b668ea4eed131c440b4cb96eec7cc0a81a3bb64cbc71292a5cc22
                                          • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                          • Opcode Fuzzy Hash: a99961e6875b668ea4eed131c440b4cb96eec7cc0a81a3bb64cbc71292a5cc22
                                          • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002), ref: 0219A063
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000002), ref: 0219A077
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 0219A084
                                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0219A0B9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$Open$ChangeCloseConfigHandleManager
                                          • String ID:
                                          • API String ID: 110783151-0
                                          • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                          • Instruction ID: 91ef955e1fb132be50eda7ab167dfc4756112a48e56be13124cdc7057e671a85
                                          • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                          • Instruction Fuzzy Hash: 0901F5321883147EEA215B38AC5EF7F3EACDF466B0F080325F522921D1DB60C909C5A1
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0219B90C,00000000,00000000,?), ref: 0219B835
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000000,0219B90C,00000000,00000000,?,?,0218A270), ref: 0219B852
                                          • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,0219B90C,00000000,00000000,?,?,0218A270), ref: 0219B866
                                          • CloseHandle.KERNEL32(00000000,?,00000000,0219B90C,00000000,00000000,?,?,0218A270), ref: 0219B873
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandlePointerWrite
                                          • String ID:
                                          • API String ID: 3604237281-0
                                          • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                          • Instruction ID: 38eb033895faee1849891cfeefb3b400419317dc178ea808f13f3a837312db35
                                          • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                          • Instruction Fuzzy Hash: 3C01C07128D214BFEA148F24BC89E7B739CEB4A2BDF000639FA61C21D1D761CE058670
                                          APIs
                                          • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                          • WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                          • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandlePointerWrite
                                          • String ID:
                                          • API String ID: 3604237281-0
                                          • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                          • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                          • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                          • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                          • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                          • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                          • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                          • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                          • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                          • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                          APIs
                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                            • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                            • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                          • _UnwindNestedFrames.LIBCMT ref: 00438124
                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                          • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                          • String ID:
                                          • API String ID: 737400349-0
                                          • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                          • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                          • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                          • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,021C741E,?,00000000,00000000,00000000,?,021C774A,00000006,0045D330), ref: 021C74A9
                                          • GetLastError.KERNEL32(?,021C741E,?,00000000,00000000,00000000,?,021C774A,00000006,0045D330,0045D328,0045D330,00000000,00000364,?,021C71F8), ref: 021C74B5
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,021C741E,?,00000000,00000000,00000000,?,021C774A,00000006,0045D330,0045D328,0045D330,00000000), ref: 021C74C3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                          • Instruction ID: 0482d55fe781ffee59e61e0f8a0f3be394d43f16d2d4a4c84bfd7500a7beb5a0
                                          • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                          • Instruction Fuzzy Hash: 8A01D836A553265BC7314A69AC44A56BFDCAB14A62B210934F916D31C1D770D801CEE4
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                          • GetLastError.KERNEL32(?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                          • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                          • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                          • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B89A
                                          • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B8AE
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B8D3
                                          • CloseHandle.KERNEL32(00000000,?,00000000,02183D5A,00465324), ref: 0219B8E1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleReadSize
                                          • String ID:
                                          • API String ID: 3919263394-0
                                          • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                          • Instruction ID: d60603cb674c3a7e2e7d7b456fcfd7281cae83c4e918b6da7ac29bcce508357f
                                          • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                          • Instruction Fuzzy Hash: 0AF0F6B12853087FE6116B20FCC4FBF375CDB866A9F000239FD02A3181CB618D059571
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                          • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B647
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B66C
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00403AF3,00465324), ref: 0041B67A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleReadSize
                                          • String ID:
                                          • API String ID: 3919263394-0
                                          • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                          • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                          • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                          • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                          APIs
                                          • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                          • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                          • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                          • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: MetricsSystem
                                          • String ID:
                                          • API String ID: 4116985748-0
                                          • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                          • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                          • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                          • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                          APIs
                                          • AllocConsole.KERNEL32 ref: 0219C120
                                          • GetConsoleWindow.KERNEL32 ref: 0219C126
                                          • ShowWindow.USER32(00000000,00000000), ref: 0219C139
                                          • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0219C15E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Console$Window$AllocOutputShow
                                          • String ID:
                                          • API String ID: 4067487056-0
                                          • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                          • Instruction ID: 3d43c8dfba40ca889eb4bf58c1d4803171671f54609bb11abbeb8e1f0dac1a0c
                                          • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                          • Instruction Fuzzy Hash: 3001A2B19C0308FFDA10FBF09C4AF8D77ADAB28701F600426B644EB091EBA9D6444E5D
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020), ref: 02199E96
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000020), ref: 02199EAA
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 02199EB7
                                          • ControlService.ADVAPI32(00000000,00000001,?), ref: 02199EC6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$Open$CloseControlHandleManager
                                          • String ID:
                                          • API String ID: 1243734080-0
                                          • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                          • Instruction ID: e445040263eca02b7c7186f885ec7eece7c472716d282e9db6443bfb20137e1b
                                          • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                          • Instruction Fuzzy Hash: 38F09036944318BFD7217B64AC89EBF3BACDB85AA1B000035F90692192DB74CD46CAB4
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 02199F98
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 02199FAC
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 02199FB9
                                          • ControlService.ADVAPI32(00000000,00000002,?), ref: 02199FC8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$Open$CloseControlHandleManager
                                          • String ID:
                                          • API String ID: 1243734080-0
                                          • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                          • Instruction ID: 63034186448cdf3f60b908b54a68dd9ee6a529b1e060a9896b4c25c310bcd23f
                                          • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                          • Instruction Fuzzy Hash: 3EF096725443187FD7117B64AC89FBF3FACDB45AA1B004035FA0592191DB74CD45C9B4
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 02199FFD
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 0219A011
                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 0219A01E
                                          • ControlService.ADVAPI32(00000000,00000003,?), ref: 0219A02D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$Open$CloseControlHandleManager
                                          • String ID:
                                          • API String ID: 1243734080-0
                                          • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                          • Instruction ID: d6df2a48b909649731db909b99ee20050fb3d62e292f6bdb907727c058583982
                                          • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                          • Instruction Fuzzy Hash: 0EF062725443186FD6216B64EC89EBF3AACDF45AA1B040035FA0592191DB68C90989B5
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,02199A81,00000000,00000000), ref: 02199E34
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,02199A81,00000000,00000000), ref: 02199E49
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,02199A81,00000000,00000000), ref: 02199E56
                                          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,02199A81,00000000,00000000), ref: 02199E61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$Open$CloseHandleManagerStart
                                          • String ID:
                                          • API String ID: 2553746010-0
                                          • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                          • Instruction ID: 264e52cfc9bce892a594dd734418dc36afa962fb88f1fd791c421d2ab7a8185c
                                          • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                          • Instruction Fuzzy Hash: FBF08972545318AFD6116B30AC88EBF2AACDF85AA2B000439F50192191DB64CC05D975
                                          APIs
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,02184AA6,00000001,?,?,00000000,00475B70,02181A5A), ref: 02184D54
                                          • SetEvent.KERNEL32(?,?,?,00000000,00475B70,02181A5A), ref: 02184D60
                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,02181A5A), ref: 02184D6B
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,02181A5A), ref: 02184D74
                                            • Part of subcall function 0219A8ED: GetLocalTime.KERNEL32(00000000), ref: 0219A907
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                          • String ID:
                                          • API String ID: 2993684571-0
                                          • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                          • Instruction ID: ccff43a00e477bbe20695333b2c14d29c4db30495b891be2f2466b87aa433410
                                          • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                          • Instruction Fuzzy Hash: 92F0B4754487507FDB2237749D0AA7A7F99EB02311F100AAAF892836B1EB3584908F66
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F5), ref: 0219C0E0
                                          • GetConsoleScreenBufferInfo.KERNEL32(00000000,?), ref: 0219C0ED
                                          • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0219C0FA
                                          • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0219C10D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Console$AttributeText$BufferHandleInfoScreen
                                          • String ID:
                                          • API String ID: 3024135584-0
                                          • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                          • Instruction ID: cde4c5e2edf131a678eb28d232d114e87eb6593b862978cfd05b6842838177ae
                                          • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                          • Instruction Fuzzy Hash: 2EE04F62104348ABD31437F5BC8DCAB3B6CE784613B101535F61290393EA7488848AB5
                                          APIs
                                          • FindResourceA.KERNEL32(0046BC64,0000000A,00000000), ref: 0219A8B7
                                          • LoadResource.KERNEL32(00000000,?,?,0218E3EA,00000000), ref: 0219A8CB
                                          • LockResource.KERNEL32(00000000,?,?,0218E3EA,00000000), ref: 0219A8D2
                                          • SizeofResource.KERNEL32(00000000,?,?,0218E3EA,00000000), ref: 0219A8E1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Resource$FindLoadLockSizeof
                                          • String ID:
                                          • API String ID: 3473537107-0
                                          • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                          • Instruction ID: 5b3a7174a80c432672cbf1ed85bd57a74e032e23a57e8680ed7b504fee8bdf1b
                                          • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                          • Instruction Fuzzy Hash: 45E01A3A200710ABCB211BA5BC8CD477E39EB86B633100036FA0582331DB359840DA58
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __aulldvrm
                                          • String ID: +$-
                                          • API String ID: 1302938615-2137968064
                                          • Opcode ID: bb05039bd10173984d8ac256ef46a28b781231ebc573ca9b653a1b6ddea24a85
                                          • Instruction ID: 3889b0bc904aa97c94cd5aa57c547395ec6e45b992e1b2a156d19a4cabb9bdea
                                          • Opcode Fuzzy Hash: bb05039bd10173984d8ac256ef46a28b781231ebc573ca9b653a1b6ddea24a85
                                          • Instruction Fuzzy Hash: 5391C4B0D84249AFCF26CE79C8506EDBBB1EF45324F19825AE875E7390D3309A46CB50
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorHandling__start
                                          • String ID: pow
                                          • API String ID: 3213639722-2276729525
                                          • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                          • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                          • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                          • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CountEventTick
                                          • String ID: >G
                                          • API String ID: 180926312-1296849874
                                          • Opcode ID: 133a24c1fca2755af0b4326124977afc2ddd04a1443bf75625f8ad95a71c6a05
                                          • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                          • Opcode Fuzzy Hash: 133a24c1fca2755af0b4326124977afc2ddd04a1443bf75625f8ad95a71c6a05
                                          • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                          APIs
                                          • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Info
                                          • String ID: $fD
                                          • API String ID: 1807457897-3092946448
                                          • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                          • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                          • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                          • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                          APIs
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 021B7D1A
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 021B7DD3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 3480331319-1018135373
                                          • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                          • Instruction ID: 4125b99c69113e63ceab34aa73659149b8e163a6fb13c84e9b41ec3fccfae6ae
                                          • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                          • Instruction Fuzzy Hash: 6841B131A402499FCB11EF68C880AEEFBB5BF84368F148165E8159B3D1D732DA02CF90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: LG$XG
                                          • API String ID: 0-1482930923
                                          • Opcode ID: 66ef9e05317a77fc50b7f8bb6c436893fd1b94a9827f47d0b5a451204cd6ab0b
                                          • Instruction ID: 4f21147a5e8f2d792eeecd5b0db0cd7ffa3d0ecd5188ebb6eb7820ab66d27089
                                          • Opcode Fuzzy Hash: 66ef9e05317a77fc50b7f8bb6c436893fd1b94a9827f47d0b5a451204cd6ab0b
                                          • Instruction Fuzzy Hash: 8C31B231E80704DEDF229F68D8407D977B69F46324F2182AADC26EB2D0D7B196418B98
                                          APIs
                                          • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 02197E6F
                                          • SHCreateMemStream.SHLWAPI(00000000), ref: 02197EBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateStream
                                          • String ID: image/jpeg
                                          • API String ID: 1369699375-3785015651
                                          • Opcode ID: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                                          • Instruction ID: 5cef63b0df87e0390396be0993e57873170e2207a7e679268ff44ab6d7a61811
                                          • Opcode Fuzzy Hash: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                                          • Instruction Fuzzy Hash: A8312972514250AFC711AF64CC84D6FBBEAFF8A700F00096DF946D7251DB799A098FA2
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 02183C91
                                            • Part of subcall function 0219AD9F: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,02183CA7), ref: 0219ADC6
                                            • Part of subcall function 0219791D: CloseHandle.KERNEL32(02183D20,?,?,02183D20,00465324), ref: 02197933
                                            • Part of subcall function 0219791D: CloseHandle.KERNEL32($SF,?,?,02183D20,00465324), ref: 0219793C
                                            • Part of subcall function 0219B881: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,02183D5A,00465324), ref: 0219B89A
                                          • Sleep.KERNEL32(000000FA,00465324), ref: 02183D63
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                          • String ID: 8>G
                                          • API String ID: 368326130-2084872820
                                          • Opcode ID: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                          • Instruction ID: 0cc44db0d04e2231810a4732a332acff1adb64a0bec05ac63285f0bbf0732fd6
                                          • Opcode Fuzzy Hash: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                          • Instruction Fuzzy Hash: 79317F31A842545ECF1AFBB4DCD4EEEB377AF80700F4001A9E91667194EF315A4ACE91
                                          APIs
                                          • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417C08
                                            • Part of subcall function 004177A2: 73502440.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                                          • SHCreateMemStream.SHLWAPI(00000000), ref: 00417C55
                                            • Part of subcall function 00417815: 7351EFB0.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                            • Part of subcall function 004177C5: 73525080.GDIPLUS(?,00417CCC), ref: 004177CE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateStream$73502440735173525080
                                          • String ID: image/jpeg
                                          • API String ID: 441360555-3785015651
                                          • Opcode ID: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                                          • Instruction ID: 3dbe320e324aa312c145f712c1d391ec03548c85c69305bb74e69b0931de3aa8
                                          • Opcode Fuzzy Hash: c54b99025069d5ee8ebf63b240a23f69e2b107a8cc8e6297c40287d8f8f82ecf
                                          • Instruction Fuzzy Hash: 13315C75508300AFC301AF65C884DAFBBF9FF8A704F000A2EF94597251DB79A905CBA6
                                          APIs
                                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,021D0DA0,?,00000050,?,?,?,?,?), ref: 021D0C20
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: ACP$OCP
                                          • API String ID: 0-711371036
                                          • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                          • Instruction ID: eeb0f3c1bc11b5d299a4e2ed3ac67b4013f9140133396401a948a6ea878ff5f7
                                          • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                          • Instruction Fuzzy Hash: BF210A6AAC4104EAE7348F65DD00B9B73AAEF4CB69F568874E909D7100F732DA41C354
                                          APIs
                                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B39,?,00000050,?,?,?,?,?), ref: 004509B9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: ACP$OCP
                                          • API String ID: 0-711371036
                                          • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                          • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                          • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                          • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                          APIs
                                            • Part of subcall function 021B3780: RtlEnterCriticalSection.NTDLL(00470D18), ref: 021B378B
                                            • Part of subcall function 021B3780: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 021B37C8
                                            • Part of subcall function 021B3B0C: __onexit.LIBCMT ref: 021B3B12
                                          • __Init_thread_footer.LIBCMT ref: 0218B10E
                                            • Part of subcall function 021B3736: RtlEnterCriticalSection.NTDLL(00470D18), ref: 021B3740
                                            • Part of subcall function 021B3736: RtlLeaveCriticalSection.NTDLL(00470D18), ref: 021B3773
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                          • String ID: ,]G$0]G
                                          • API String ID: 2974294136-589576501
                                          • Opcode ID: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                          • Instruction ID: e6801c6480e8be8e3ca871d4ac47606a218c9f7bc89ba69ea754decb209c8e2d
                                          • Opcode Fuzzy Hash: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                          • Instruction Fuzzy Hash: B4218231A841089ECB25FBA4D8D0AEDB736AF40314F54406AD905AB191EF346E4ACE95
                                          APIs
                                            • Part of subcall function 0219277A: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 0219279E
                                            • Part of subcall function 0219277A: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 021927BB
                                            • Part of subcall function 0219277A: RegCloseKey.ADVAPI32(?), ref: 021927C6
                                          • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0218B9D3
                                          • PathFileExistsA.SHLWAPI(?), ref: 0218B9E0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                          • String ID: TUF
                                          • API String ID: 1133728706-3431404234
                                          • Opcode ID: d94b965c273a091329a6f5a73edda4c14bb16021ab9e8e668cdf3b753880c9a9
                                          • Instruction ID: 0fd98c6aa195301b3d457e415729445599c172a85fd2a4a787e1b5a7c3045fd0
                                          • Opcode Fuzzy Hash: d94b965c273a091329a6f5a73edda4c14bb16021ab9e8e668cdf3b753880c9a9
                                          • Instruction Fuzzy Hash: 4D219471AC42086ECF15F7B0CCD5DFE776A6F10308F540165A902A7180FF759A09CE92
                                          APIs
                                          • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 02197F5B
                                          • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 02197F80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateStream
                                          • String ID: image/png
                                          • API String ID: 1369699375-2966254431
                                          • Opcode ID: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                                          • Instruction ID: 80295d92744d4a1f0df45a58d6d5268af8c9d484e412911d70647409cb6cbe74
                                          • Opcode Fuzzy Hash: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                                          • Instruction Fuzzy Hash: 64218E71640211AFC701AF64CC88CAFBBAEEF8A750F10051DF90683261DF359A46DFA2
                                          APIs
                                          • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417CF4
                                            • Part of subcall function 004177A2: 73502440.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                                          • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417D19
                                            • Part of subcall function 00417815: 7351EFB0.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                            • Part of subcall function 004177C5: 73525080.GDIPLUS(?,00417CCC), ref: 004177CE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateStream$73502440735173525080
                                          • String ID: image/png
                                          • API String ID: 441360555-2966254431
                                          • Opcode ID: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                                          • Instruction ID: e3b7944e5392015f30009faa46d0af48502643625c308f0969f1fef2cb3c76d4
                                          • Opcode Fuzzy Hash: 25f78a6c939044b88dc5ef2f4c2223da77e15e8f6bc9fc575da7c5d280fbe838
                                          • Instruction Fuzzy Hash: AA21A135204211AFC300AF61CC88CAFBBBDEFCA714F10052EF90693151DB399945CBA6
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 02184C58
                                            • Part of subcall function 0219A8ED: GetLocalTime.KERNEL32(00000000), ref: 0219A907
                                          • GetLocalTime.KERNEL32(?), ref: 02184CB5
                                          Strings
                                          • KeepAlive | Enabled | Timeout: , xrefs: 02184C4C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: KeepAlive | Enabled | Timeout:
                                          • API String ID: 481472006-1507639952
                                          • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                          • Instruction ID: 9a9fd7a5f35fcf14aeeae71cede827c7a46cf4fdf36455c07c3c9ddac209eb08
                                          • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                          • Instruction Fuzzy Hash: 86213271A842806FC711F728984877EBBA99BD1305F58046DE90A03261EF78558E8FAB
                                          APIs
                                          • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                          Strings
                                          • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: KeepAlive | Enabled | Timeout:
                                          • API String ID: 481472006-1507639952
                                          • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                          • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                          • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                          • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                          APIs
                                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 02186A9C
                                            • Part of subcall function 021869CB: _wcslen.LIBCMT ref: 021869EF
                                            • Part of subcall function 021869CB: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 02186A50
                                          • CoUninitialize.COMBASE ref: 02186AF5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InitializeObjectUninitialize_wcslen
                                          • String ID: C:\Users\user\Desktop\Wk731bq71c.exe
                                          • API String ID: 3851391207-4200293159
                                          • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                          • Instruction ID: 1d491df2eebef1a5ebc483f1ab62fda4d244334d6975c389ede1851b59b7dd0f
                                          • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                          • Instruction Fuzzy Hash: 5C0192723857916FE2247B21DC89F7B775DDF41765F21412EF94187180EBA1DC404EA2
                                          APIs
                                          • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: | $%02i:%02i:%02i:%03i
                                          • API String ID: 481472006-2430845779
                                          • Opcode ID: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                          • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                          • Opcode Fuzzy Hash: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                          • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                          APIs
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 02192879
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 021928AF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: QueryValue
                                          • String ID: TUF
                                          • API String ID: 3660427363-3431404234
                                          • Opcode ID: b09a7c0ab263ba9602d255bab372d31fcc1af682bb43ba0fd7320c28ba140ab5
                                          • Instruction ID: 76bb08f2311f4e13ae9ecce2e26e76cd91b66c1ef94b798b39d2b733c309c3fa
                                          • Opcode Fuzzy Hash: b09a7c0ab263ba9602d255bab372d31fcc1af682bb43ba0fd7320c28ba140ab5
                                          • Instruction Fuzzy Hash: 6F014FB6A00108BFEF05AB94DC45EFE7ABEEF48251F14007AF901E2140E7B19F009A70
                                          APIs
                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0219A115
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: TUF$xIG
                                          • API String ID: 1174141254-2109147017
                                          • Opcode ID: 2fae138b2d3ec9b0a0b8c660c1a787d1356efb4be69c0d9f0b79cf6aaa7c8617
                                          • Instruction ID: f34424c19037e9f0c3972de0d69721413fc47f94c2878f392b3baf1d2df422f0
                                          • Opcode Fuzzy Hash: 2fae138b2d3ec9b0a0b8c660c1a787d1356efb4be69c0d9f0b79cf6aaa7c8617
                                          • Instruction Fuzzy Hash: 2101B1706883016ECE29F634D895ABE37438F80750F50843AD89A472E4EF649949CFD7
                                          APIs
                                          • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: alarm.wav$xIG
                                          • API String ID: 1174141254-4080756945
                                          • Opcode ID: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                                          • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                          • Opcode Fuzzy Hash: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                                          • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                          APIs
                                            • Part of subcall function 0218AADD: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0218AAEB
                                            • Part of subcall function 0218AADD: wsprintfW.USER32 ref: 0218AB6C
                                            • Part of subcall function 0219A8ED: GetLocalTime.KERNEL32(00000000), ref: 0219A907
                                          • CloseHandle.KERNEL32(?), ref: 0218AA31
                                          • UnhookWindowsHookEx.USER32 ref: 0218AA44
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                          • String ID: Online Keylogger Stopped
                                          • API String ID: 1623830855-1496645233
                                          • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                          • Instruction ID: 9d7916abba655fd9179e164d1221910453955327960826b055ecc2c3b8bf4589
                                          • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                          • Instruction Fuzzy Hash: E3012B35684240AFCB267B34C98A7BD7BB29F41301F50049EE98203992EB755485DFE6
                                          APIs
                                            • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                            • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                            • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                          • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                          • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                          • String ID: Online Keylogger Stopped
                                          • API String ID: 1623830855-1496645233
                                          • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                          • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                          • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                          • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                          APIs
                                          • waveInPrepareHeader.WINMM(00473D90,00000020,00475BF4,00475BF4,00000000,00475B70,00473EE8,?,00000000,02181B7A), ref: 021819AE
                                          • waveInAddBuffer.WINMM(00473D90,00000020,?,00000000,02181B7A), ref: 021819C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$BufferHeaderPrepare
                                          • String ID: T=G
                                          • API String ID: 2315374483-379896819
                                          • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                          • Instruction ID: adaf0c742866a7cd12cf1842bb40dc19984dba5dca8e02a0151b6b8ad16bf950
                                          • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                          • Instruction Fuzzy Hash: F901A271701310AFD710AF28EC84E65BBB6FB49315B014539E909C3761EB31AC549F58
                                          APIs
                                          • waveInPrepareHeader.WINMM(008024A0,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                          • waveInAddBuffer.WINMM(008024A0,00000020,?,00000000,00401913), ref: 0040175D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$BufferHeaderPrepare
                                          • String ID: T=G
                                          • API String ID: 2315374483-379896819
                                          • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                          • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                          • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                          • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                          APIs
                                          • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocaleValid
                                          • String ID: IsValidLocaleName$j=D
                                          • API String ID: 1901932003-3128777819
                                          • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                          • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                          • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                          • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID: T=G$T=G
                                          • API String ID: 3519838083-3732185208
                                          • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                          • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                          • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                          • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                          APIs
                                          • GetKeyState.USER32(00000011), ref: 0040AD5B
                                            • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                            • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                            • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                            • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                            • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                            • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                            • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                            • Part of subcall function 00409D58: SetEvent.KERNEL32(00000000,?,00000000,0040A91C,00000000), ref: 00409D84
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                          • String ID: [AltL]$[AltR]
                                          • API String ID: 2738857842-2658077756
                                          • Opcode ID: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                                          • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                          • Opcode Fuzzy Hash: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                                          • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                          APIs
                                          • _free.LIBCMT ref: 00448825
                                            • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                            • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorFreeHeapLast_free
                                          • String ID: `@$`@
                                          • API String ID: 1353095263-20545824
                                          • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                          • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                          • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                          • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                          APIs
                                          • GetKeyState.USER32(00000012), ref: 0040ADB5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: State
                                          • String ID: [CtrlL]$[CtrlR]
                                          • API String ID: 1649606143-2446555240
                                          • Opcode ID: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                                          • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                          • Opcode Fuzzy Hash: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                                          • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0218C5A3,00000000,?,00000000), ref: 02192BEF
                                          • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 02192BFF
                                          Strings
                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 02192BED
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DeleteOpenValue
                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                          • API String ID: 2654517830-1051519024
                                          • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                          • Instruction ID: 42cbcf7c88f61a83248ac2a4113c4c4703d0c25a8e4614e6463ddc227f00ec5b
                                          • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                          • Instruction Fuzzy Hash: EBE01770280308BAEF105F61AC06FAB3BACEB41B89F004164F901E6091E375DA04AA64
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040C33C,00000000,?,00000000), ref: 00412988
                                          • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00412998
                                          Strings
                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DeleteOpenValue
                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                          • API String ID: 2654517830-1051519024
                                          • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                          • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                          • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                          • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                          APIs
                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,0218DC11,0000000D,00000033,00000000,00000032,00000000,0046662C,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0218C14D
                                          • GetLastError.KERNEL32 ref: 0218C158
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateErrorLastMutex
                                          • String ID: Rmc-I7G983
                                          • API String ID: 1925916568-3173645232
                                          • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                          • Instruction ID: 48c3c372fe97b5246244f6d7c3b28865681a4f078920683e3b9c887992426612
                                          • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                          • Instruction Fuzzy Hash: 85D01270B483019BD7282B747C89B693555E784703F004079B50FC55D0CF7488409D15
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CommandLine
                                          • String ID: `&~
                                          • API String ID: 3253501508-3287665965
                                          • Opcode ID: 2702c5f118dd3839dbc4dd886e2cdb728e5ea39e06e223ea52f31eba807d30e7
                                          • Instruction ID: 13d69598d350970c9b91df73096b24a53109b9b907d0ea4b726438dfa3130670
                                          • Opcode Fuzzy Hash: 2702c5f118dd3839dbc4dd886e2cdb728e5ea39e06e223ea52f31eba807d30e7
                                          • Instruction Fuzzy Hash: 09B0027D8157009FC7419F79BD5D1443BA0B75861339094B5DC19C7B35DA358085EF18
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,02181D3F), ref: 021BFD5B
                                          • GetLastError.KERNEL32 ref: 021BFD69
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 021BFDC4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390811737.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2180000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$ErrorLast
                                          • String ID:
                                          • API String ID: 1717984340-0
                                          • Opcode ID: 51d5f03fba1b172d5651f1593246994e43d26d1415dc77cb91aa80c4233d165d
                                          • Instruction ID: 21941b29a6a7d630953f7779657334570deb96736337fd5c551597a61ae6b4c1
                                          • Opcode Fuzzy Hash: 51d5f03fba1b172d5651f1593246994e43d26d1415dc77cb91aa80c4233d165d
                                          • Instruction Fuzzy Hash: 5C41E939644206AFCB279F64CC44BFA7BB5EF01324F25416DF85997691EB319902CB50
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                          • GetLastError.KERNEL32 ref: 0043FB02
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2390191976.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2390191976.0000000000473000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2390191976.0000000000476000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_Wk731bq71c.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$ErrorLast
                                          • String ID:
                                          • API String ID: 1717984340-0
                                          • Opcode ID: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                          • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                          • Opcode Fuzzy Hash: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                          • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759

                                          Execution Graph

                                          Execution Coverage:1.9%
                                          Dynamic/Decrypted Code Coverage:22%
                                          Signature Coverage:0%
                                          Total number of Nodes:1178
                                          Total number of Limit Nodes:62
                                          execution_graph 87275 41d4d0 87276 41d4e6 _Yarn ___scrt_fastfail 87275->87276 87290 41d6e3 87276->87290 87296 431f99 21 API calls _Yarn 87276->87296 87279 41d6f4 87281 41d734 87279->87281 87282 41d760 87279->87282 87292 431f99 21 API calls _Yarn 87279->87292 87280 41d696 ___scrt_fastfail 87280->87281 87297 431f99 21 API calls _Yarn 87280->87297 87282->87281 87299 41d474 21 API calls ___scrt_fastfail 87282->87299 87286 41d72d ___scrt_fastfail 87286->87281 87293 43264f 87286->87293 87288 41d6be ___scrt_fastfail 87288->87281 87298 431f99 21 API calls _Yarn 87288->87298 87290->87281 87291 41d071 RtlDeleteCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection ___scrt_fastfail 87290->87291 87291->87279 87292->87286 87300 43256f 87293->87300 87295 432657 87295->87282 87296->87280 87297->87288 87298->87290 87299->87281 87301 432588 87300->87301 87305 43257e 87300->87305 87301->87305 87306 431f99 21 API calls _Yarn 87301->87306 87303 4325a9 87303->87305 87307 43293a CryptAcquireContextA 87303->87307 87305->87295 87306->87303 87308 432956 87307->87308 87309 43295b CryptGenRandom 87307->87309 87308->87305 87309->87308 87310 432970 CryptReleaseContext 87309->87310 87310->87308 87311 42c5d3 87312 42c5eb ___scrt_fastfail 87311->87312 87319 42c691 87311->87319 87314 42c637 87312->87314 87312->87319 87321 42c831 21 API calls ___scrt_fastfail 87312->87321 87322 42c831 21 API calls ___scrt_fastfail 87314->87322 87316 42c63c 87316->87319 87323 42c513 21 API calls 87316->87323 87318 42c656 87318->87319 87324 42c04a 87318->87324 87321->87312 87322->87316 87323->87318 87326 42c064 87324->87326 87325 42c0a4 87333 42c133 87325->87333 87336 42bf7b 87325->87336 87326->87325 87335 42baae 21 API calls 87326->87335 87329 42c4d4 87329->87319 87330 42c100 87331 42bf7b 24 API calls 87330->87331 87330->87333 87331->87333 87333->87329 87349 42b527 21 API calls 87333->87349 87350 42baae 21 API calls 87333->87350 87335->87325 87351 42cbaa 87336->87351 87338 42bf8e 87341 42bfa3 87338->87341 87356 430c02 21 API calls 87338->87356 87340 42c030 87340->87330 87341->87340 87357 430bd5 21 API calls 87341->87357 87343 42bfcd 87343->87340 87358 430c02 21 API calls 87343->87358 87345 42bfef 87345->87340 87359 430c02 21 API calls 87345->87359 87347 42c00f 87347->87340 87360 430c02 21 API calls 87347->87360 87349->87333 87350->87333 87361 43265b CryptAcquireContextA CryptGenRandom CryptReleaseContext 87351->87361 87353 42cbbe 87354 42cbf4 87353->87354 87362 42f85f 21 API calls 87353->87362 87354->87338 87356->87341 87357->87343 87358->87345 87359->87347 87360->87340 87361->87353 87362->87354 87363 426030 87368 4260f7 recv 87363->87368 87369 44e8b6 87370 44e8c1 87369->87370 87371 44e8e9 87370->87371 87372 44e8da 87370->87372 87376 44e8f8 87371->87376 87391 455573 27 API calls 2 library calls 87371->87391 87390 445354 20 API calls __dosmaperr 87372->87390 87378 44b9be 87376->87378 87377 44e8df ___scrt_fastfail 87379 44b9d6 87378->87379 87380 44b9cb 87378->87380 87381 44b9de 87379->87381 87388 44b9e7 _strftime 87379->87388 87392 446aff 87380->87392 87399 446ac5 20 API calls __dosmaperr 87381->87399 87384 44ba11 RtlReAllocateHeap 87386 44b9d3 87384->87386 87384->87388 87385 44b9ec 87400 445354 20 API calls __dosmaperr 87385->87400 87386->87377 87388->87384 87388->87385 87401 442200 7 API calls 2 library calls 87388->87401 87390->87377 87391->87376 87393 446b3d 87392->87393 87397 446b0d _strftime 87392->87397 87403 445354 20 API calls __dosmaperr 87393->87403 87395 446b28 RtlAllocateHeap 87396 446b3b 87395->87396 87395->87397 87396->87386 87397->87393 87397->87395 87402 442200 7 API calls 2 library calls 87397->87402 87399->87386 87400->87386 87401->87388 87402->87397 87403->87396 87404 426091 87409 42610e send 87404->87409 87410 570000 87413 570006 87410->87413 87414 570015 87413->87414 87417 5707a6 87414->87417 87418 5707c1 87417->87418 87419 5707ca CreateToolhelp32Snapshot 87418->87419 87420 5707e6 Module32First 87418->87420 87419->87418 87419->87420 87421 5707f5 87420->87421 87422 570005 87420->87422 87424 570465 87421->87424 87425 570490 87424->87425 87426 5704a1 VirtualAlloc 87425->87426 87427 5704d9 87425->87427 87426->87427 87427->87427 87428 74003c 87429 740049 87428->87429 87443 740e0f SetErrorMode SetErrorMode 87429->87443 87434 740265 87435 7402ce VirtualProtect 87434->87435 87437 74030b 87435->87437 87436 740439 VirtualFree 87441 7405f4 LoadLibraryA 87436->87441 87442 7404be 87436->87442 87437->87436 87438 7404e3 LoadLibraryA 87438->87442 87440 7408c7 87441->87440 87442->87438 87442->87441 87444 740223 87443->87444 87445 740d90 87444->87445 87446 740dad 87445->87446 87447 740dbb GetPEB 87446->87447 87448 740238 VirtualAlloc 87446->87448 87447->87448 87448->87434 87449 43a998 87451 43a9a4 _swprintf __FrameHandler3::FrameUnwindToState 87449->87451 87450 43a9b2 87467 445354 20 API calls __dosmaperr 87450->87467 87451->87450 87454 43a9dc 87451->87454 87453 43a9b7 87468 43a827 26 API calls _Deallocate 87453->87468 87462 444acc RtlEnterCriticalSection 87454->87462 87457 43a9e7 87463 43aa88 87457->87463 87460 43a9c2 __wsopen_s 87462->87457 87465 43aa96 87463->87465 87464 43a9f2 87469 43aa0f RtlLeaveCriticalSection std::_Lockit::~_Lockit 87464->87469 87465->87464 87470 448416 39 API calls 2 library calls 87465->87470 87467->87453 87468->87460 87469->87460 87470->87465 87471 402bcc 87472 402bd7 87471->87472 87474 402bdf 87471->87474 87489 403315 28 API calls _Deallocate 87472->87489 87475 402beb 87474->87475 87479 4015d3 87474->87479 87476 402bdd 87481 43360d 87479->87481 87482 402be9 87481->87482 87485 43362e std::_Facet_Register 87481->87485 87490 43a88c 87481->87490 87497 442200 7 API calls 2 library calls 87481->87497 87484 433dec std::_Facet_Register 87499 437bd7 RaiseException 87484->87499 87485->87484 87498 437bd7 RaiseException 87485->87498 87488 433e09 87489->87476 87495 446aff _strftime 87490->87495 87491 446b3d 87501 445354 20 API calls __dosmaperr 87491->87501 87493 446b28 RtlAllocateHeap 87494 446b3b 87493->87494 87493->87495 87494->87481 87495->87491 87495->87493 87500 442200 7 API calls 2 library calls 87495->87500 87497->87481 87498->87484 87499->87488 87500->87495 87501->87494 87502 4339be 87503 4339ca __FrameHandler3::FrameUnwindToState 87502->87503 87534 4336b3 87503->87534 87505 4339d1 87506 433b24 87505->87506 87510 4339fb 87505->87510 87832 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 87506->87832 87508 433b2b 87833 4426be 28 API calls _Atexit 87508->87833 87520 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 87510->87520 87826 4434d1 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 87510->87826 87511 433b31 87834 442670 28 API calls _Atexit 87511->87834 87514 433a14 87516 433a1a 87514->87516 87827 443475 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 87514->87827 87515 433b39 87518 433a9b 87545 433c5e 87518->87545 87520->87518 87828 43edf4 38 API calls 4 library calls 87520->87828 87528 433abd 87528->87508 87529 433ac1 87528->87529 87530 433aca 87529->87530 87830 442661 28 API calls _Atexit 87529->87830 87831 433842 13 API calls 2 library calls 87530->87831 87533 433ad2 87533->87516 87535 4336bc 87534->87535 87835 433e0a IsProcessorFeaturePresent 87535->87835 87537 4336c8 87836 4379ee 10 API calls 3 library calls 87537->87836 87539 4336cd 87544 4336d1 87539->87544 87837 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 87539->87837 87541 4336e8 87541->87505 87542 4336da 87542->87541 87838 437a17 8 API calls 3 library calls 87542->87838 87544->87505 87839 436050 87545->87839 87548 433aa1 87549 443422 87548->87549 87841 44ddc9 87549->87841 87551 44342b 87552 433aaa 87551->87552 87845 44e0d3 38 API calls 87551->87845 87554 40d767 87552->87554 87847 41bce3 LoadLibraryA GetProcAddress 87554->87847 87556 40d783 GetModuleFileNameW 87852 40e168 87556->87852 87558 40d79f 87867 401fbd 87558->87867 87561 401fbd 28 API calls 87562 40d7bd 87561->87562 87871 41afc3 87562->87871 87566 40d7cf 87896 401d8c 87566->87896 87568 40d7d8 87569 40d835 87568->87569 87570 40d7eb 87568->87570 87902 401d64 87569->87902 88280 40e986 111 API calls 87570->88280 87573 40d845 87576 401d64 28 API calls 87573->87576 87574 40d7fd 87575 401d64 28 API calls 87574->87575 87579 40d809 87575->87579 87577 40d864 87576->87577 87907 404cbf 87577->87907 88281 40e937 68 API calls 87579->88281 87580 40d873 87911 405ce6 87580->87911 87583 40d824 88282 40e155 68 API calls 87583->88282 87584 40d87f 87914 401eef 87584->87914 87587 40d88b 87918 401eea 87587->87918 87589 40d894 87591 401eea 26 API calls 87589->87591 87590 401eea 26 API calls 87592 40dc9f 87590->87592 87593 40d89d 87591->87593 87829 433c94 GetModuleHandleW 87592->87829 87594 401d64 28 API calls 87593->87594 87595 40d8a6 87594->87595 87922 401ebd 87595->87922 87597 40d8b1 87598 401d64 28 API calls 87597->87598 87599 40d8ca 87598->87599 87600 401d64 28 API calls 87599->87600 87602 40d8e5 87600->87602 87601 40d946 87604 401d64 28 API calls 87601->87604 87619 40e134 87601->87619 87602->87601 88283 4085b4 87602->88283 87609 40d95d 87604->87609 87605 40d912 87606 401eef 26 API calls 87605->87606 87607 40d91e 87606->87607 87610 401eea 26 API calls 87607->87610 87608 40d9a4 87926 40bed7 87608->87926 87609->87608 87614 4124b7 3 API calls 87609->87614 87611 40d927 87610->87611 88287 4124b7 RegOpenKeyExA 87611->88287 87613 40d9aa 87615 40d82d 87613->87615 87929 41a463 87613->87929 87620 40d988 87614->87620 87615->87590 87618 40d9c5 87621 40da18 87618->87621 87946 40697b 87618->87946 88305 412902 31 API calls 87619->88305 87620->87608 88290 412902 31 API calls 87620->88290 87623 401d64 28 API calls 87621->87623 87626 40da21 87623->87626 87635 40da32 87626->87635 87636 40da2d 87626->87636 87628 40e14a 88306 4112b5 65 API calls ___scrt_fastfail 87628->88306 87629 40d9e4 88291 40699d 31 API calls 87629->88291 87630 40d9ee 87633 401d64 28 API calls 87630->87633 87643 40d9f7 87633->87643 87640 401d64 28 API calls 87635->87640 88294 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 87636->88294 87637 40d9e9 88292 4064d0 97 API calls 87637->88292 87641 40da3b 87640->87641 87950 41ae08 87641->87950 87643->87621 87646 40da13 87643->87646 87644 40da46 87954 401e18 87644->87954 88293 4064d0 97 API calls 87646->88293 87647 40da51 87958 401e13 87647->87958 87650 40da5a 87651 401d64 28 API calls 87650->87651 87652 40da63 87651->87652 87653 401d64 28 API calls 87652->87653 87654 40da7d 87653->87654 87655 401d64 28 API calls 87654->87655 87656 40da97 87655->87656 87657 401d64 28 API calls 87656->87657 87659 40dab0 87657->87659 87658 40db1d 87660 40db2c 87658->87660 87666 40dcaa ___scrt_fastfail 87658->87666 87659->87658 87661 401d64 28 API calls 87659->87661 87662 401d64 28 API calls 87660->87662 87689 40dbac ___scrt_fastfail 87660->87689 87664 40dac5 _wcslen 87661->87664 87663 40db3e 87662->87663 87665 401d64 28 API calls 87663->87665 87664->87658 87667 401d64 28 API calls 87664->87667 87668 40db50 87665->87668 88296 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 87666->88296 87669 40dae0 87667->87669 87671 401d64 28 API calls 87668->87671 87672 401d64 28 API calls 87669->87672 87673 40db62 87671->87673 87674 40daf5 87672->87674 87677 401d64 28 API calls 87673->87677 87962 40c89e 87674->87962 87675 40dcef 87676 401d64 28 API calls 87675->87676 87679 40dd16 87676->87679 87678 40db8b 87677->87678 87683 401d64 28 API calls 87678->87683 88098 401f66 87679->88098 87682 401e18 26 API calls 87685 40db14 87682->87685 87686 40db9c 87683->87686 87688 401e13 26 API calls 87685->87688 88019 40bc67 87686->88019 87687 40dd25 88102 4126d2 RegCreateKeyA 87687->88102 87688->87658 88088 4128a2 87689->88088 87693 40dc45 ctype 87697 401d64 28 API calls 87693->87697 87695 401d64 28 API calls 87696 40dd47 87695->87696 88108 43a5e7 87696->88108 87698 40dc5c 87697->87698 87698->87675 87702 40dc70 87698->87702 87701 40dd5e 88297 41beb0 87 API calls ___scrt_fastfail 87701->88297 87704 401d64 28 API calls 87702->87704 87703 40dd81 87708 401f66 28 API calls 87703->87708 87706 40dc7e 87704->87706 87709 41ae08 29 API calls 87706->87709 87707 40dd65 CreateThread 87707->87703 88749 41c96f 10 API calls 87707->88749 87710 40dd96 87708->87710 87711 40dc87 87709->87711 87712 401f66 28 API calls 87710->87712 88295 40e219 112 API calls 87711->88295 87714 40dda5 87712->87714 88112 41a686 87714->88112 87715 40dc8c 87715->87675 87716 40dc93 87715->87716 87716->87615 87719 401d64 28 API calls 87720 40ddb6 87719->87720 87721 401d64 28 API calls 87720->87721 87722 40ddcb 87721->87722 87723 401d64 28 API calls 87722->87723 87724 40ddeb 87723->87724 87725 43a5e7 _strftime 42 API calls 87724->87725 87726 40ddf8 87725->87726 87727 401d64 28 API calls 87726->87727 87728 40de03 87727->87728 87729 401d64 28 API calls 87728->87729 87730 40de14 87729->87730 87731 401d64 28 API calls 87730->87731 87732 40de29 87731->87732 87733 401d64 28 API calls 87732->87733 87734 40de3a 87733->87734 87735 40de41 StrToIntA 87734->87735 88136 409517 87735->88136 87738 401d64 28 API calls 87739 40de5c 87738->87739 87740 40dea1 87739->87740 87741 40de68 87739->87741 87744 401d64 28 API calls 87740->87744 88298 43360d 22 API calls 3 library calls 87741->88298 87743 40de71 87745 401d64 28 API calls 87743->87745 87746 40deb1 87744->87746 87747 40de84 87745->87747 87748 40def9 87746->87748 87749 40debd 87746->87749 87750 40de8b CreateThread 87747->87750 87752 401d64 28 API calls 87748->87752 88299 43360d 22 API calls 3 library calls 87749->88299 87750->87740 88747 419128 110 API calls 2 library calls 87750->88747 87754 40df02 87752->87754 87753 40dec6 87755 401d64 28 API calls 87753->87755 87757 40df6c 87754->87757 87758 40df0e 87754->87758 87756 40ded8 87755->87756 87759 40dedf CreateThread 87756->87759 87760 401d64 28 API calls 87757->87760 87761 401d64 28 API calls 87758->87761 87759->87748 88751 419128 110 API calls 2 library calls 87759->88751 87763 40df75 87760->87763 87762 40df1e 87761->87762 87766 401d64 28 API calls 87762->87766 87764 40df81 87763->87764 87765 40dfba 87763->87765 87767 401d64 28 API calls 87764->87767 88161 41a7a2 GetComputerNameExW GetUserNameW 87765->88161 87768 40df33 87766->87768 87771 40df8a 87767->87771 88300 40c854 33 API calls 87768->88300 87776 401d64 28 API calls 87771->87776 87772 401e18 26 API calls 87773 40dfce 87772->87773 87775 401e13 26 API calls 87773->87775 87778 40dfd7 87775->87778 87779 40df9f 87776->87779 87777 40df46 87780 401e18 26 API calls 87777->87780 87781 40dfe0 SetProcessDEPPolicy 87778->87781 87782 40dfe3 CreateThread 87778->87782 87789 43a5e7 _strftime 42 API calls 87779->87789 87783 40df52 87780->87783 87781->87782 87784 40e004 87782->87784 87785 40dff8 CreateThread 87782->87785 88720 40e54f 87782->88720 87786 401e13 26 API calls 87783->87786 87787 40e019 87784->87787 87788 40e00d CreateThread 87784->87788 87785->87784 88748 410f36 138 API calls 87785->88748 87790 40df5b CreateThread 87786->87790 87792 40e073 87787->87792 87794 401f66 28 API calls 87787->87794 87788->87787 88750 411524 38 API calls ___scrt_fastfail 87788->88750 87791 40dfac 87789->87791 87790->87757 88752 40196b 49 API calls _strftime 87790->88752 88301 40b95c 7 API calls 87791->88301 88172 41246e RegOpenKeyExA 87792->88172 87795 40e046 87794->87795 88302 404c9e 28 API calls 87795->88302 87798 40e053 87800 401f66 28 API calls 87798->87800 87802 40e062 87800->87802 87801 40e12a 88184 40cbac 87801->88184 87805 41a686 79 API calls 87802->87805 87804 41ae08 29 API calls 87807 40e0a4 87804->87807 87808 40e067 87805->87808 88175 412584 RegOpenKeyExW 87807->88175 87810 401eea 26 API calls 87808->87810 87810->87792 87813 401e13 26 API calls 87816 40e0c5 87813->87816 87814 40e0ed DeleteFileW 87815 40e0f4 87814->87815 87814->87816 87818 41ae08 29 API calls 87815->87818 87816->87814 87816->87815 87817 40e0db Sleep 87816->87817 88303 401e07 87817->88303 87820 40e104 87818->87820 88180 41297a RegOpenKeyExW 87820->88180 87822 40e117 87823 401e13 26 API calls 87822->87823 87824 40e121 87823->87824 87825 401e13 26 API calls 87824->87825 87825->87801 87826->87514 87827->87520 87828->87518 87829->87528 87830->87530 87831->87533 87832->87508 87833->87511 87834->87515 87835->87537 87836->87539 87837->87542 87838->87544 87840 433c71 GetStartupInfoW 87839->87840 87840->87548 87842 44dddb 87841->87842 87843 44ddd2 87841->87843 87842->87551 87846 44dcc8 51 API calls 5 library calls 87843->87846 87845->87551 87846->87842 87848 41bd22 LoadLibraryA GetProcAddress 87847->87848 87849 41bd12 GetModuleHandleA GetProcAddress 87847->87849 87850 41bd4b 32 API calls 87848->87850 87851 41bd3b LoadLibraryA GetProcAddress 87848->87851 87849->87848 87850->87556 87851->87850 88307 41a63f FindResourceA 87852->88307 87855 43a88c _Yarn 21 API calls 87856 40e192 _Yarn 87855->87856 88310 401f86 87856->88310 87859 401eef 26 API calls 87860 40e1b8 87859->87860 87861 401eea 26 API calls 87860->87861 87862 40e1c1 87861->87862 87863 43a88c _Yarn 21 API calls 87862->87863 87864 40e1d2 _Yarn 87863->87864 88314 406052 87864->88314 87866 40e205 87866->87558 87868 401fcc 87867->87868 88322 402501 87868->88322 87870 401fea 87870->87561 87881 41afd6 87871->87881 87872 401eea 26 API calls 87873 41b078 87872->87873 87874 401eea 26 API calls 87873->87874 87876 41b080 87874->87876 87875 41b048 88329 403b60 28 API calls 87875->88329 87879 401eea 26 API calls 87876->87879 87882 40d7c6 87879->87882 87880 41b054 87883 401eef 26 API calls 87880->87883 87881->87875 87884 401eef 26 API calls 87881->87884 87886 401eea 26 API calls 87881->87886 87891 41b046 87881->87891 88327 403b60 28 API calls 87881->88327 88328 41bfa9 28 API calls 87881->88328 87892 40e8bd 87882->87892 87885 41b05d 87883->87885 87884->87881 87887 401eea 26 API calls 87885->87887 87886->87881 87888 41b065 87887->87888 88330 41bfa9 28 API calls 87888->88330 87891->87872 87893 40e8ca 87892->87893 87895 40e8da 87893->87895 88331 40200a 26 API calls 87893->88331 87895->87566 87897 40200a 87896->87897 87901 40203a 87897->87901 88332 402654 26 API calls 87897->88332 87899 40202b 88333 4026ba 26 API calls _Deallocate 87899->88333 87901->87568 87903 401d6c 87902->87903 87904 401d74 87903->87904 88334 401fff 28 API calls 87903->88334 87904->87573 87908 404ccb 87907->87908 88335 402e78 87908->88335 87910 404cee 87910->87580 88344 404bc4 87911->88344 87913 405cf4 87913->87584 87915 401efe 87914->87915 87917 401f0a 87915->87917 88353 4021b9 26 API calls 87915->88353 87917->87587 87919 4021b9 87918->87919 87920 4021e8 87919->87920 88354 40262e 26 API calls _Deallocate 87919->88354 87920->87589 87924 401ec9 87922->87924 87923 401ee4 87923->87597 87924->87923 87925 402325 28 API calls 87924->87925 87925->87923 88355 401e8f 87926->88355 87928 40bee1 CreateMutexA GetLastError 87928->87613 88357 41b15b 87929->88357 87931 41a471 88361 412513 RegOpenKeyExA 87931->88361 87934 401eef 26 API calls 87935 41a49f 87934->87935 87936 401eea 26 API calls 87935->87936 87937 41a4a7 87936->87937 87938 41a4fa 87937->87938 87939 412513 31 API calls 87937->87939 87938->87618 87940 41a4cd 87939->87940 87941 41a4d8 StrToIntA 87940->87941 87942 41a4ef 87941->87942 87943 41a4e6 87941->87943 87945 401eea 26 API calls 87942->87945 88366 41c102 28 API calls 87943->88366 87945->87938 87947 40698f 87946->87947 87948 4124b7 3 API calls 87947->87948 87949 406996 87948->87949 87949->87629 87949->87630 87951 41ae1c 87950->87951 88367 40b027 87951->88367 87953 41ae24 87953->87644 87955 401e27 87954->87955 87957 401e33 87955->87957 88380 402121 26 API calls 87955->88380 87957->87647 87960 402121 87958->87960 87959 402150 87959->87650 87960->87959 88381 402718 26 API calls _Deallocate 87960->88381 87963 40c8ba 87962->87963 87964 40c8da 87963->87964 87965 40c90f 87963->87965 87966 40c8d0 87963->87966 88386 41a74b 29 API calls 87964->88386 87969 41b15b 2 API calls 87965->87969 87968 40ca03 GetLongPathNameW 87966->87968 88382 403b40 87968->88382 87972 40c914 87969->87972 87970 40c8e3 87973 401e18 26 API calls 87970->87973 87975 40c918 87972->87975 87976 40c96a 87972->87976 87977 40c8ed 87973->87977 87980 403b40 28 API calls 87975->87980 87979 403b40 28 API calls 87976->87979 87984 401e13 26 API calls 87977->87984 87978 403b40 28 API calls 87982 40ca27 87978->87982 87983 40c978 87979->87983 87981 40c926 87980->87981 87989 403b40 28 API calls 87981->87989 88389 40cc37 28 API calls 87982->88389 87988 403b40 28 API calls 87983->87988 87984->87966 87986 40ca3a 88390 402860 28 API calls 87986->88390 87991 40c98e 87988->87991 87992 40c93c 87989->87992 87990 40ca45 88391 402860 28 API calls 87990->88391 88388 402860 28 API calls 87991->88388 88387 402860 28 API calls 87992->88387 87996 40ca4f 87999 401e13 26 API calls 87996->87999 87997 40c999 88000 401e18 26 API calls 87997->88000 87998 40c947 88001 401e18 26 API calls 87998->88001 88002 40ca59 87999->88002 88003 40c9a4 88000->88003 88004 40c952 88001->88004 88005 401e13 26 API calls 88002->88005 88006 401e13 26 API calls 88003->88006 88007 401e13 26 API calls 88004->88007 88008 40ca62 88005->88008 88009 40c9ad 88006->88009 88010 40c95b 88007->88010 88011 401e13 26 API calls 88008->88011 88012 401e13 26 API calls 88009->88012 88013 401e13 26 API calls 88010->88013 88014 40ca6b 88011->88014 88012->87977 88013->87977 88015 401e13 26 API calls 88014->88015 88016 40ca74 88015->88016 88017 401e13 26 API calls 88016->88017 88018 40ca7d 88017->88018 88018->87682 88020 40bc7a _wcslen 88019->88020 88021 40bc84 88020->88021 88022 40bcce 88020->88022 88024 40bc8d CreateDirectoryW 88021->88024 88023 40c89e 32 API calls 88022->88023 88025 40bce0 88023->88025 88401 40856b 88024->88401 88027 401e18 26 API calls 88025->88027 88028 40bccc 88027->88028 88030 401e13 26 API calls 88028->88030 88029 40bca9 88431 4028cf 88029->88431 88035 40bcf7 88030->88035 88032 40bcb5 88033 401e18 26 API calls 88032->88033 88034 40bcc3 88033->88034 88036 401e13 26 API calls 88034->88036 88037 40bd10 88035->88037 88038 40bd2d 88035->88038 88036->88028 88405 40bb7b 88037->88405 88039 40bd36 CopyFileW 88038->88039 88040 40be07 88039->88040 88043 40bd48 _wcslen 88039->88043 88044 40bb7b 31 API calls 88040->88044 88042 40bd21 88042->87689 88043->88040 88045 40bd64 88043->88045 88046 40bdb7 88043->88046 88047 40be18 88044->88047 88048 40c89e 32 API calls 88045->88048 88049 40c89e 32 API calls 88046->88049 88050 40be4d 88047->88050 88057 40be2a SetFileAttributesW 88047->88057 88053 40bd6a 88048->88053 88052 40bdbd 88049->88052 88051 40be95 CloseHandle 88050->88051 88054 403b40 28 API calls 88050->88054 88058 401e07 88051->88058 88056 401e18 26 API calls 88052->88056 88055 401e18 26 API calls 88053->88055 88059 40be63 88054->88059 88060 40bd76 88055->88060 88087 40bdb1 88056->88087 88072 40be39 _wcslen 88057->88072 88061 40beb1 ShellExecuteW 88058->88061 88062 41ae08 29 API calls 88059->88062 88063 401e13 26 API calls 88060->88063 88064 40bec4 88061->88064 88065 40bece ExitProcess 88061->88065 88066 40be76 88062->88066 88068 40bd7f 88063->88068 88069 40bed7 2 API calls 88064->88069 88434 412774 RegCreateKeyW 88066->88434 88067 401e13 26 API calls 88071 40bdcf 88067->88071 88070 40856b 28 API calls 88068->88070 88073 40bdf8 88069->88073 88074 40bd93 88070->88074 88078 40bddb CreateDirectoryW 88071->88078 88072->88050 88075 40be4a SetFileAttributesW 88072->88075 88073->88042 88077 4028cf 28 API calls 88074->88077 88075->88050 88081 40bd9f 88077->88081 88080 401e07 88078->88080 88084 40bdeb CopyFileW 88080->88084 88083 401e18 26 API calls 88081->88083 88082 401e13 26 API calls 88082->88051 88085 40bda8 88083->88085 88084->88040 88084->88073 88086 401e13 26 API calls 88085->88086 88086->88087 88087->88067 88089 4128c0 88088->88089 88090 406052 28 API calls 88089->88090 88091 4128d5 88090->88091 88092 401fbd 28 API calls 88091->88092 88093 4128e5 88092->88093 88094 4126d2 29 API calls 88093->88094 88095 4128ef 88094->88095 88096 401eea 26 API calls 88095->88096 88097 4128fc 88096->88097 88097->87693 88099 401f6e 88098->88099 88462 402301 88099->88462 88103 412722 88102->88103 88105 4126eb 88102->88105 88104 401eea 26 API calls 88103->88104 88106 40dd3b 88104->88106 88107 4126fd RegSetValueExA RegCloseKey 88105->88107 88106->87695 88107->88103 88109 43a600 _strftime 88108->88109 88466 43993e 88109->88466 88113 41a737 88112->88113 88114 41a69c GetLocalTime 88112->88114 88115 401eea 26 API calls 88113->88115 88116 404cbf 28 API calls 88114->88116 88117 41a73f 88115->88117 88118 41a6de 88116->88118 88120 401eea 26 API calls 88117->88120 88119 405ce6 28 API calls 88118->88119 88121 41a6ea 88119->88121 88122 40ddaa 88120->88122 88500 4027cb 88121->88500 88122->87719 88124 41a6f6 88125 405ce6 28 API calls 88124->88125 88126 41a702 88125->88126 88503 406478 76 API calls 88126->88503 88128 41a710 88129 401eea 26 API calls 88128->88129 88130 41a71c 88129->88130 88131 401eea 26 API calls 88130->88131 88132 41a725 88131->88132 88133 401eea 26 API calls 88132->88133 88134 41a72e 88133->88134 88135 401eea 26 API calls 88134->88135 88135->88113 88137 409536 _wcslen 88136->88137 88138 409541 88137->88138 88139 409558 88137->88139 88140 40c89e 32 API calls 88138->88140 88141 40c89e 32 API calls 88139->88141 88142 409549 88140->88142 88143 409560 88141->88143 88144 401e18 26 API calls 88142->88144 88145 401e18 26 API calls 88143->88145 88160 409553 88144->88160 88146 40956e 88145->88146 88147 401e13 26 API calls 88146->88147 88149 409576 88147->88149 88148 401e13 26 API calls 88151 4095ad 88148->88151 88150 40856b 28 API calls 88149->88150 88152 409588 88150->88152 88508 409837 88151->88508 88154 4028cf 28 API calls 88152->88154 88156 409593 88154->88156 88157 401e18 26 API calls 88156->88157 88158 40959d 88157->88158 88159 401e13 26 API calls 88158->88159 88159->88160 88160->88148 88162 403b40 28 API calls 88161->88162 88163 41a7f1 88162->88163 88530 403cbb 88163->88530 88165 41a7fd 88166 4028cf 28 API calls 88165->88166 88167 41a807 88166->88167 88168 401e13 26 API calls 88167->88168 88169 41a810 88168->88169 88170 401e13 26 API calls 88169->88170 88171 40dfc3 88170->88171 88171->87772 88173 40e08b 88172->88173 88174 41248f RegQueryValueExA RegCloseKey 88172->88174 88173->87801 88173->87804 88174->88173 88176 4125b0 RegQueryValueExW RegCloseKey 88175->88176 88177 4125dd 88175->88177 88176->88177 88178 403b40 28 API calls 88177->88178 88179 40e0ba 88178->88179 88179->87813 88181 412992 RegDeleteValueW 88180->88181 88182 4129a6 88180->88182 88181->88182 88183 4129a2 88181->88183 88182->87822 88183->87822 88185 40cbc5 88184->88185 88186 41246e 3 API calls 88185->88186 88187 40cbcc 88186->88187 88188 40cbeb 88187->88188 88550 401602 88187->88550 88192 413fd4 88188->88192 88190 40cbd9 88553 4127d5 RegCreateKeyA 88190->88553 88193 413feb 88192->88193 88570 41aa73 88193->88570 88195 413ff6 88196 401d64 28 API calls 88195->88196 88197 41400f 88196->88197 88198 43a5e7 _strftime 42 API calls 88197->88198 88199 41401c 88198->88199 88200 414021 Sleep 88199->88200 88201 41402e 88199->88201 88200->88201 88202 401f66 28 API calls 88201->88202 88203 41403d 88202->88203 88204 401d64 28 API calls 88203->88204 88205 41404b 88204->88205 88206 401fbd 28 API calls 88205->88206 88207 414053 88206->88207 88208 41afc3 28 API calls 88207->88208 88209 41405b 88208->88209 88574 404262 WSAStartup 88209->88574 88211 414065 88212 401d64 28 API calls 88211->88212 88213 41406e 88212->88213 88214 401d64 28 API calls 88213->88214 88253 4140ed 88213->88253 88216 414087 88214->88216 88215 401f66 28 API calls 88215->88253 88218 401d64 28 API calls 88216->88218 88217 401fbd 28 API calls 88217->88253 88219 414098 88218->88219 88221 401d64 28 API calls 88219->88221 88220 41afc3 28 API calls 88220->88253 88222 4140a9 88221->88222 88224 401d64 28 API calls 88222->88224 88223 4085b4 28 API calls 88223->88253 88225 4140ba 88224->88225 88226 401d64 28 API calls 88225->88226 88228 4140cb 88226->88228 88227 401eef 26 API calls 88227->88253 88229 401d64 28 API calls 88228->88229 88230 4140dd 88229->88230 88677 404101 87 API calls 88230->88677 88232 41a686 79 API calls 88232->88253 88234 414244 WSAGetLastError 88678 41bc76 30 API calls 88234->88678 88241 401d64 28 API calls 88241->88253 88242 404cbf 28 API calls 88242->88253 88243 401d8c 26 API calls 88243->88253 88244 4027cb 28 API calls 88244->88253 88245 43a5e7 _strftime 42 API calls 88247 414b80 Sleep 88245->88247 88246 405ce6 28 API calls 88246->88253 88247->88253 88248 401eea 26 API calls 88248->88253 88253->88215 88253->88217 88253->88220 88253->88223 88253->88227 88253->88232 88253->88234 88253->88241 88253->88242 88253->88243 88253->88244 88253->88245 88253->88246 88253->88248 88255 412513 31 API calls 88253->88255 88279 41446f 88253->88279 88575 413f9a 88253->88575 88581 4041f1 88253->88581 88588 404915 88253->88588 88603 40428c connect 88253->88603 88663 4047eb WaitForSingleObject 88253->88663 88679 404c9e 28 API calls 88253->88679 88680 41a96d GlobalMemoryStatusEx 88253->88680 88681 413683 50 API calls 88253->88681 88682 4082dc 28 API calls 88253->88682 88683 440c51 26 API calls 88253->88683 88684 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 88253->88684 88255->88253 88256 403b40 28 API calls 88256->88279 88259 401d64 28 API calls 88260 4144ed GetTickCount 88259->88260 88687 41ad46 28 API calls 88260->88687 88263 41ad46 28 API calls 88263->88279 88265 41aec8 28 API calls 88265->88279 88268 405ce6 28 API calls 88268->88279 88269 40275c 28 API calls 88269->88279 88270 4027cb 28 API calls 88270->88279 88272 401eea 26 API calls 88272->88279 88273 401e13 26 API calls 88273->88279 88276 401f66 28 API calls 88276->88279 88277 41a686 79 API calls 88277->88279 88278 414b22 CreateThread 88278->88279 88719 419e89 104 API calls 88278->88719 88279->88253 88279->88256 88279->88259 88279->88263 88279->88265 88279->88268 88279->88269 88279->88270 88279->88272 88279->88273 88279->88276 88279->88277 88279->88278 88685 40cbf1 6 API calls 88279->88685 88686 41adee 28 API calls 88279->88686 88688 41aca0 GetLastInputInfo GetTickCount 88279->88688 88689 41ac52 30 API calls ___scrt_fastfail 88279->88689 88690 40e679 29 API calls 88279->88690 88691 4027ec 28 API calls 88279->88691 88692 404468 59 API calls _Yarn 88279->88692 88693 4045d5 111 API calls _Yarn 88279->88693 88694 40a767 85 API calls 88279->88694 88280->87574 88281->87583 88284 4085c0 88283->88284 88285 402e78 28 API calls 88284->88285 88286 4085e4 88285->88286 88286->87605 88288 4124e1 RegQueryValueExA RegCloseKey 88287->88288 88289 41250b 88287->88289 88288->88289 88289->87601 88290->87608 88291->87637 88292->87630 88293->87621 88294->87635 88295->87715 88296->87675 88297->87707 88298->87743 88299->87753 88300->87777 88301->87765 88302->87798 88304 401e0c 88303->88304 88305->87628 88308 40e183 88307->88308 88309 41a65c LoadResource LockResource SizeofResource 88307->88309 88308->87855 88309->88308 88311 401f8e 88310->88311 88317 402325 88311->88317 88313 401fa4 88313->87859 88315 401f86 28 API calls 88314->88315 88316 406066 88315->88316 88316->87866 88318 40232f 88317->88318 88320 40233a 88318->88320 88321 40294a 28 API calls 88318->88321 88320->88313 88321->88320 88323 40250d 88322->88323 88325 40252b 88323->88325 88326 40261a 28 API calls 88323->88326 88325->87870 88326->88325 88327->87881 88328->87881 88329->87880 88330->87891 88331->87895 88332->87899 88333->87901 88336 402e85 88335->88336 88337 402e98 88336->88337 88339 402ea9 88336->88339 88340 402eae 88336->88340 88342 403445 28 API calls 88337->88342 88339->87910 88340->88339 88343 40225b 26 API calls 88340->88343 88342->88339 88343->88339 88345 404bd0 88344->88345 88348 40245c 88345->88348 88347 404be4 88347->87913 88349 402469 88348->88349 88351 402478 88349->88351 88352 402ad3 28 API calls 88349->88352 88351->88347 88352->88351 88353->87917 88354->87920 88356 401e94 88355->88356 88358 41b183 88357->88358 88359 41b168 GetCurrentProcess IsWow64Process 88357->88359 88358->87931 88359->88358 88360 41b17f 88359->88360 88360->87931 88362 412541 RegQueryValueExA RegCloseKey 88361->88362 88363 412569 88361->88363 88362->88363 88364 401f66 28 API calls 88363->88364 88365 41257e 88364->88365 88365->87934 88366->87942 88368 40b02f 88367->88368 88371 40b04b 88368->88371 88370 40b045 88370->87953 88372 40b055 88371->88372 88373 40b060 88372->88373 88374 40b093 88372->88374 88378 408556 EntryPoint 88373->88378 88379 40b138 29 API calls 88374->88379 88376 40b078 88376->88370 88378->88376 88379->88376 88380->87957 88381->87959 88383 403b48 88382->88383 88392 403b7a 88383->88392 88386->87970 88387->87998 88388->87997 88389->87986 88390->87990 88391->87996 88393 403b86 88392->88393 88396 403b9e 88393->88396 88395 403b5a 88395->87978 88397 403ba8 88396->88397 88399 403bb3 88397->88399 88400 403cfd 28 API calls 88397->88400 88399->88395 88400->88399 88402 408577 88401->88402 88440 402ca8 88402->88440 88404 40859b 88404->88029 88406 40bba1 88405->88406 88407 40bbdd 88405->88407 88449 40b0dd 88406->88449 88409 40bc1e 88407->88409 88412 40b0dd 28 API calls 88407->88412 88411 40bc5f 88409->88411 88414 40b0dd 28 API calls 88409->88414 88410 40bbb3 88413 4028cf 28 API calls 88410->88413 88411->88042 88415 40bbf4 88412->88415 88416 40bbbd 88413->88416 88417 40bc35 88414->88417 88418 4028cf 28 API calls 88415->88418 88419 412774 29 API calls 88416->88419 88420 4028cf 28 API calls 88417->88420 88421 40bbfe 88418->88421 88423 40bbd1 88419->88423 88424 40bc3f 88420->88424 88422 412774 29 API calls 88421->88422 88425 40bc12 88422->88425 88426 401e13 26 API calls 88423->88426 88427 412774 29 API calls 88424->88427 88428 401e13 26 API calls 88425->88428 88426->88407 88429 40bc53 88427->88429 88428->88409 88430 401e13 26 API calls 88429->88430 88430->88411 88453 402d8b 88431->88453 88433 4028dd 88433->88032 88435 4127c6 88434->88435 88438 412789 88434->88438 88436 401e13 26 API calls 88435->88436 88437 40be89 88436->88437 88437->88082 88439 4127a2 RegSetValueExW RegCloseKey 88438->88439 88439->88435 88441 402cb5 88440->88441 88442 402cd9 88441->88442 88443 402cc8 88441->88443 88445 402cde 88441->88445 88442->88404 88447 403374 28 API calls 88443->88447 88445->88442 88448 402f21 26 API calls 88445->88448 88447->88442 88448->88442 88450 40b0e9 88449->88450 88451 402ca8 28 API calls 88450->88451 88452 40b10c 88451->88452 88452->88410 88454 402d97 88453->88454 88457 4030f7 88454->88457 88456 402dab 88456->88433 88458 403101 88457->88458 88460 403115 88458->88460 88461 4036c2 28 API calls 88458->88461 88460->88456 88461->88460 88463 40230d 88462->88463 88464 402325 28 API calls 88463->88464 88465 401f80 88464->88465 88465->87687 88484 43a545 88466->88484 88468 43998b 88493 4392de 38 API calls 2 library calls 88468->88493 88470 439950 88470->88468 88471 439965 88470->88471 88483 40dd54 88470->88483 88491 445354 20 API calls __dosmaperr 88471->88491 88473 43996a 88492 43a827 26 API calls _Deallocate 88473->88492 88476 439997 88479 4399c6 88476->88479 88494 43a58a 42 API calls __Tolower 88476->88494 88477 439a32 88496 43a4f1 26 API calls 2 library calls 88477->88496 88479->88477 88495 43a4f1 26 API calls 2 library calls 88479->88495 88481 439af9 _strftime 88481->88483 88497 445354 20 API calls __dosmaperr 88481->88497 88483->87701 88483->87703 88485 43a54a 88484->88485 88486 43a55d 88484->88486 88498 445354 20 API calls __dosmaperr 88485->88498 88486->88470 88488 43a54f 88499 43a827 26 API calls _Deallocate 88488->88499 88490 43a55a 88490->88470 88491->88473 88492->88483 88493->88476 88494->88476 88495->88477 88496->88481 88497->88483 88498->88488 88499->88490 88504 401e9b 88500->88504 88502 4027d9 88502->88124 88503->88128 88505 401ea7 88504->88505 88506 40245c 28 API calls 88505->88506 88507 401eb9 88506->88507 88507->88502 88509 409855 88508->88509 88510 4124b7 3 API calls 88509->88510 88511 40985c 88510->88511 88512 409870 88511->88512 88513 40988a 88511->88513 88514 4095cf 88512->88514 88515 409875 88512->88515 88525 4082dc 28 API calls 88513->88525 88514->87738 88523 4082dc 28 API calls 88515->88523 88518 409898 88526 4098a5 86 API calls 88518->88526 88519 409883 88524 409959 29 API calls 88519->88524 88522 409888 88522->88514 88523->88519 88524->88522 88527 40999f 131 API calls 88524->88527 88525->88518 88526->88514 88528 4099b5 54 API calls 88526->88528 88529 4099a9 126 API calls 88526->88529 88533 403dc2 88530->88533 88532 403cc9 88532->88165 88534 403dce 88533->88534 88537 402ffd 88534->88537 88536 403de3 88536->88532 88538 40300e 88537->88538 88543 4032a4 88538->88543 88542 40302e 88542->88536 88544 4032b0 88543->88544 88545 40301a 88543->88545 88549 4032b6 28 API calls 88544->88549 88545->88542 88548 4035e8 28 API calls 88545->88548 88548->88542 88556 4395ba 88550->88556 88554 4127ed RegSetValueExA RegCloseKey 88553->88554 88555 412814 88553->88555 88554->88555 88555->88188 88559 43953b 88556->88559 88558 401608 88558->88190 88560 43954a 88559->88560 88561 43955e 88559->88561 88567 445354 20 API calls __dosmaperr 88560->88567 88566 43955a __alldvrm 88561->88566 88569 447601 11 API calls 2 library calls 88561->88569 88563 43954f 88568 43a827 26 API calls _Deallocate 88563->88568 88566->88558 88567->88563 88568->88566 88569->88566 88573 41aab9 _Yarn ___scrt_fastfail 88570->88573 88571 401f66 28 API calls 88572 41ab2e 88571->88572 88572->88195 88573->88571 88574->88211 88576 413fb3 WSASetLastError 88575->88576 88577 413fa9 88575->88577 88576->88253 88695 413e37 35 API calls ___std_exception_copy 88577->88695 88579 413fae 88579->88576 88582 404206 socket 88581->88582 88583 4041fd 88581->88583 88585 404220 88582->88585 88586 404224 CreateEventW 88582->88586 88696 404262 WSAStartup 88583->88696 88585->88253 88586->88253 88587 404202 88587->88582 88587->88585 88589 4049b1 88588->88589 88590 40492a 88588->88590 88589->88253 88591 404933 88590->88591 88592 404987 CreateEventA CreateThread 88590->88592 88593 404942 GetLocalTime 88590->88593 88591->88592 88592->88589 88699 404b1d 88592->88699 88697 41ad46 28 API calls 88593->88697 88595 40495b 88698 404c9e 28 API calls 88595->88698 88597 404968 88598 401f66 28 API calls 88597->88598 88599 404977 88598->88599 88600 41a686 79 API calls 88599->88600 88601 40497c 88600->88601 88602 401eea 26 API calls 88601->88602 88602->88592 88604 4043e1 88603->88604 88605 4042b3 88603->88605 88606 4043e7 WSAGetLastError 88604->88606 88607 404343 88604->88607 88605->88607 88608 4042e8 88605->88608 88610 404cbf 28 API calls 88605->88610 88606->88607 88609 4043f7 88606->88609 88607->88253 88703 420151 27 API calls 88608->88703 88611 4042f7 88609->88611 88612 4043fc 88609->88612 88614 4042d4 88610->88614 88617 401f66 28 API calls 88611->88617 88714 41bc76 30 API calls 88612->88714 88618 401f66 28 API calls 88614->88618 88616 4042f0 88616->88611 88620 404306 88616->88620 88621 404448 88617->88621 88622 4042e3 88618->88622 88619 40440b 88715 404c9e 28 API calls 88619->88715 88629 404315 88620->88629 88630 40434c 88620->88630 88624 401f66 28 API calls 88621->88624 88625 41a686 79 API calls 88622->88625 88627 404457 88624->88627 88625->88608 88626 404418 88628 401f66 28 API calls 88626->88628 88631 41a686 79 API calls 88627->88631 88632 404427 88628->88632 88634 401f66 28 API calls 88629->88634 88711 420f34 55 API calls 88630->88711 88631->88607 88636 41a686 79 API calls 88632->88636 88635 404324 88634->88635 88638 401f66 28 API calls 88635->88638 88639 40442c 88636->88639 88637 404354 88640 404389 88637->88640 88641 404359 88637->88641 88642 404333 88638->88642 88644 401eea 26 API calls 88639->88644 88713 4202ea 28 API calls 88640->88713 88645 401f66 28 API calls 88641->88645 88646 41a686 79 API calls 88642->88646 88644->88607 88648 404368 88645->88648 88660 404338 88646->88660 88647 404391 88649 4043be CreateEventW CreateEventW 88647->88649 88651 401f66 28 API calls 88647->88651 88650 401f66 28 API calls 88648->88650 88649->88607 88652 404377 88650->88652 88655 4043a7 88651->88655 88653 41a686 79 API calls 88652->88653 88656 40437c 88653->88656 88657 401f66 28 API calls 88655->88657 88712 420592 53 API calls 88656->88712 88659 4043b6 88657->88659 88661 41a686 79 API calls 88659->88661 88704 420191 88660->88704 88662 4043bb 88661->88662 88662->88649 88664 404805 SetEvent CloseHandle 88663->88664 88665 40481c closesocket 88663->88665 88666 40489c 88664->88666 88667 404829 88665->88667 88666->88253 88668 404838 88667->88668 88669 40483f 88667->88669 88718 404ab1 83 API calls 88668->88718 88671 404851 WaitForSingleObject 88669->88671 88672 404892 SetEvent CloseHandle 88669->88672 88673 420191 3 API calls 88671->88673 88672->88666 88674 404860 SetEvent WaitForSingleObject 88673->88674 88675 420191 3 API calls 88674->88675 88676 404878 SetEvent CloseHandle CloseHandle 88675->88676 88676->88672 88677->88253 88678->88253 88679->88253 88680->88253 88681->88253 88682->88253 88683->88253 88684->88253 88685->88279 88686->88279 88687->88279 88688->88279 88689->88279 88690->88279 88691->88279 88692->88279 88693->88279 88694->88279 88695->88579 88696->88587 88697->88595 88698->88597 88702 404b29 101 API calls 88699->88702 88701 404b26 88702->88701 88703->88616 88705 420199 88704->88705 88707 41dc15 88704->88707 88705->88607 88706 41dc23 88717 41d950 RtlDeleteCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 88706->88717 88707->88706 88716 41cd69 RtlDeleteCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 88707->88716 88710 41dc2a 88711->88637 88712->88660 88713->88647 88714->88619 88715->88626 88716->88706 88717->88710 88718->88669 88726 40e56a 88720->88726 88721 4124b7 3 API calls 88721->88726 88722 40e60e 88755 4082dc 28 API calls 88722->88755 88724 40e59c 88753 40bf04 74 API calls ___scrt_fastfail 88724->88753 88725 40e5fe Sleep 88725->88726 88726->88721 88726->88722 88726->88724 88726->88725 88729 41ae08 29 API calls 88726->88729 88733 412774 29 API calls 88726->88733 88735 401e13 26 API calls 88726->88735 88738 401f66 28 API calls 88726->88738 88742 4126d2 29 API calls 88726->88742 88754 4082dc 28 API calls 88726->88754 88729->88726 88730 40e619 88731 41ae08 29 API calls 88730->88731 88732 40e625 88731->88732 88734 412774 29 API calls 88732->88734 88733->88726 88736 40e638 88734->88736 88735->88726 88737 401e13 26 API calls 88736->88737 88739 40e644 88737->88739 88738->88726 88740 401f66 28 API calls 88739->88740 88741 40e655 88740->88741 88743 4126d2 29 API calls 88741->88743 88742->88726 88744 40e668 88743->88744 88756 411699 TerminateProcess WaitForSingleObject 88744->88756 88746 40e670 ExitProcess 88757 411637 60 API calls 88748->88757 88754->88726 88755->88730 88756->88746

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1197 74003c-740047 1198 74004c-740263 call 740a3f call 740e0f call 740d90 VirtualAlloc 1197->1198 1199 740049 1197->1199 1214 740265-740289 call 740a69 1198->1214 1215 74028b-740292 1198->1215 1199->1198 1220 7402ce-7403c2 VirtualProtect call 740cce call 740ce7 1214->1220 1217 7402a1-7402b0 1215->1217 1219 7402b2-7402cc 1217->1219 1217->1220 1219->1217 1226 7403d1-7403e0 1220->1226 1227 7403e2-740437 call 740ce7 1226->1227 1228 740439-7404b8 VirtualFree 1226->1228 1227->1226 1230 7405f4-7405fe 1228->1230 1231 7404be-7404cd 1228->1231 1234 740604-74060d 1230->1234 1235 74077f-740789 1230->1235 1233 7404d3-7404dd 1231->1233 1233->1230 1239 7404e3-740505 LoadLibraryA 1233->1239 1234->1235 1240 740613-740637 1234->1240 1237 7407a6-7407b0 1235->1237 1238 74078b-7407a3 1235->1238 1241 7407b6-7407cb 1237->1241 1242 74086e-7408be LoadLibraryA 1237->1242 1238->1237 1243 740517-740520 1239->1243 1244 740507-740515 1239->1244 1245 74063e-740648 1240->1245 1246 7407d2-7407d5 1241->1246 1249 7408c7-7408f9 1242->1249 1247 740526-740547 1243->1247 1244->1247 1245->1235 1248 74064e-74065a 1245->1248 1250 740824-740833 1246->1250 1251 7407d7-7407e0 1246->1251 1252 74054d-740550 1247->1252 1248->1235 1253 740660-74066a 1248->1253 1256 740902-74091d 1249->1256 1257 7408fb-740901 1249->1257 1255 740839-74083c 1250->1255 1258 7407e4-740822 1251->1258 1259 7407e2 1251->1259 1260 740556-74056b 1252->1260 1261 7405e0-7405ef 1252->1261 1254 74067a-740689 1253->1254 1264 740750-74077a 1254->1264 1265 74068f-7406b2 1254->1265 1255->1242 1266 74083e-740847 1255->1266 1257->1256 1258->1246 1259->1250 1262 74056d 1260->1262 1263 74056f-74057a 1260->1263 1261->1233 1262->1261 1267 74057c-740599 1263->1267 1268 74059b-7405bb 1263->1268 1264->1245 1269 7406b4-7406ed 1265->1269 1270 7406ef-7406fc 1265->1270 1271 740849 1266->1271 1272 74084b-74086c 1266->1272 1280 7405bd-7405db 1267->1280 1268->1280 1269->1270 1274 7406fe-740748 1270->1274 1275 74074b 1270->1275 1271->1242 1272->1255 1274->1275 1275->1254 1280->1252
                                          APIs
                                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0074024D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.4552975730.0000000000740000.00000040.00001000.00020000.00000000.sdmp, Offset: 00740000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_740000_yavascript.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: cess$kernel32.dll
                                          • API String ID: 4275171209-1230238691
                                          • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction ID: 4e37773463db04960ea610d5de5676e08d2a9b3ebfc9bb26bbd888d8c2496cbd
                                          • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction Fuzzy Hash: A2527874A00229DFDB64CF68C984BA8BBB1BF09304F1480D9E90DAB251DB34AE94DF55
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005707CE
                                          • Module32First.KERNEL32(00000000,00000224), ref: 005707EE
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.4552749576.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Offset: 00570000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_570000_yavascript.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFirstModule32SnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 3833638111-0
                                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction ID: c37dc0234fea29136d3d771a7a271456785c5c9f071133de22f0d6809040a875
                                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction Fuzzy Hash: 96F06231101711ABD7243AB5A88DA6F7BECFF49765F109528E64A910C0DA70F8455A61
                                          APIs
                                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005704B6
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.4552749576.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Offset: 00570000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_570000_yavascript.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction ID: 4dd4981e71cfa6a264e88526c7b49592368c0a79f17a07c8fe929a62e90706a6
                                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction Fuzzy Hash: 1B112C79A40208EFDB01DF98C985E98BFF5AB08350F058094F9489B362D371EA50EB80