Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uShK30bvrV.exe

Overview

General Information

Sample name:uShK30bvrV.exe
renamed because original name is a hash value
Original sample name:e54d75beb808253cbb5c06bbe37211b9a7467c39dac776ea72df26be3b30f5ea.exe
Analysis ID:1589024
MD5:cbe2a525a70f1ae12ed19db3d2ce8a9a
SHA1:c9ebbc22c4c793bd7ab2651b997aea1fb6651715
SHA256:e54d75beb808253cbb5c06bbe37211b9a7467c39dac776ea72df26be3b30f5ea
Tags:exeuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • uShK30bvrV.exe (PID: 4724 cmdline: "C:\Users\user\Desktop\uShK30bvrV.exe" MD5: CBE2A525A70F1AE12ED19DB3D2CE8A9A)
    • powershell.exe (PID: 5620 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7128 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4148 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 4144 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • uShK30bvrV.exe (PID: 3712 cmdline: "C:\Users\user\Desktop\uShK30bvrV.exe" MD5: CBE2A525A70F1AE12ED19DB3D2CE8A9A)
    • uShK30bvrV.exe (PID: 1532 cmdline: "C:\Users\user\Desktop\uShK30bvrV.exe" MD5: CBE2A525A70F1AE12ED19DB3D2CE8A9A)
  • LwGrjoPJzyBSZs.exe (PID: 3380 cmdline: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe MD5: CBE2A525A70F1AE12ED19DB3D2CE8A9A)
    • schtasks.exe (PID: 5264 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • LwGrjoPJzyBSZs.exe (PID: 6572 cmdline: "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe" MD5: CBE2A525A70F1AE12ED19DB3D2CE8A9A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["127.0.0.1:2404:1", "jacksonnnn233.theworkpc.com:3217:1"], "Assigned name": "newtestHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-EFKPJD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "newtest"}
SourceRuleDescriptionAuthorStrings
00000010.00000002.2263044898.0000000001357000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6b6f8:$a1: Remcos restarted by watchdog!
                  • 0x6bc70:$a3: %02i:%02i:%02i:%03i
                  16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x65a04:$str_b2: Executing file:
                  • 0x6683c:$str_b3: GetDirectListeningPort
                  • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x66380:$str_b7: \update.vbs
                  • 0x65a2c:$str_b9: Downloaded file:
                  • 0x65a18:$str_b10: Downloading file:
                  • 0x65abc:$str_b12: Failed to upload file:
                  • 0x66804:$str_b13: StartForward
                  • 0x66824:$str_b14: StopForward
                  • 0x662d8:$str_b15: fso.DeleteFile "
                  • 0x6626c:$str_b16: On Error Resume Next
                  • 0x66308:$str_b17: fso.DeleteFolder "
                  • 0x65aac:$str_b18: Uploaded file:
                  • 0x65a6c:$str_b19: Unable to delete:
                  • 0x662a0:$str_b20: while fso.FileExists("
                  • 0x65f49:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 29 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\uShK30bvrV.exe", ParentImage: C:\Users\user\Desktop\uShK30bvrV.exe, ParentProcessId: 4724, ParentProcessName: uShK30bvrV.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", ProcessId: 5620, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\uShK30bvrV.exe", ParentImage: C:\Users\user\Desktop\uShK30bvrV.exe, ParentProcessId: 4724, ParentProcessName: uShK30bvrV.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", ProcessId: 5620, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe, ParentImage: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe, ParentProcessId: 3380, ParentProcessName: LwGrjoPJzyBSZs.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp", ProcessId: 5264, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\uShK30bvrV.exe", ParentImage: C:\Users\user\Desktop\uShK30bvrV.exe, ParentProcessId: 4724, ParentProcessName: uShK30bvrV.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp", ProcessId: 4144, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\uShK30bvrV.exe", ParentImage: C:\Users\user\Desktop\uShK30bvrV.exe, ParentProcessId: 4724, ParentProcessName: uShK30bvrV.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe", ProcessId: 5620, ProcessName: powershell.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\uShK30bvrV.exe", ParentImage: C:\Users\user\Desktop\uShK30bvrV.exe, ParentProcessId: 4724, ParentProcessName: uShK30bvrV.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp", ProcessId: 4144, ProcessName: schtasks.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: 81 A2 99 0C B4 68 98 29 1F BB D8 71 1F EE CE 08 10 8A 12 AC DA 42 69 C8 5E EA CA C0 18 B9 61 35 D8 E1 D2 C6 CD 0B DA F8 50 6B A0 8E 36 DB 8F A0 12 56 9E 30 DB 24 45 AE C4 5E B4 BF 70 0B 12 08 25 0A 09 1D 6A 65 8B 8E A7 10 CB DE DA 4A , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\uShK30bvrV.exe, ProcessId: 1532, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-EFKPJD\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T08:35:32.954262+010020365941Malware Command and Control Activity Detected192.168.2.549999172.86.115.2213217TCP
                  2025-01-11T08:36:09.816459+010020365941Malware Command and Control Activity Detected192.168.2.549709172.86.115.2213217TCP
                  2025-01-11T08:36:34.216958+010020365941Malware Command and Control Activity Detected192.168.2.549843172.86.115.2213217TCP
                  2025-01-11T08:36:58.639607+010020365941Malware Command and Control Activity Detected192.168.2.549985172.86.115.2213217TCP
                  2025-01-11T08:37:23.296541+010020365941Malware Command and Control Activity Detected192.168.2.549987172.86.115.2213217TCP
                  2025-01-11T08:37:47.945462+010020365941Malware Command and Control Activity Detected192.168.2.549989172.86.115.2213217TCP
                  2025-01-11T08:38:12.847451+010020365941Malware Command and Control Activity Detected192.168.2.549991172.86.115.2213217TCP
                  2025-01-11T08:38:37.595939+010020365941Malware Command and Control Activity Detected192.168.2.549993172.86.115.2213217TCP
                  2025-01-11T08:39:02.062540+010020365941Malware Command and Control Activity Detected192.168.2.549995172.86.115.2213217TCP
                  2025-01-11T08:39:26.579141+010020365941Malware Command and Control Activity Detected192.168.2.549997172.86.115.2213217TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: uShK30bvrV.exeAvira: detected
                  Source: jacksonnnn233.theworkpc.comAvira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeAvira: detection malicious, Label: HEUR/AGEN.1309499
                  Source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["127.0.0.1:2404:1", "jacksonnnn233.theworkpc.com:3217:1"], "Assigned name": "newtestHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-EFKPJD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "newtest"}
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeReversingLabs: Detection: 83%
                  Source: uShK30bvrV.exeVirustotal: Detection: 63%Perma Link
                  Source: uShK30bvrV.exeReversingLabs: Detection: 83%
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2263044898.0000000001357000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 1532, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeJoe Sandbox ML: detected
                  Source: uShK30bvrV.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,16_2_0043293A
                  Source: uShK30bvrV.exe, 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_72c8dbd3-8

                  Exploits

                  barindex
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00406764 _wcslen,CoGetObject,16_2_00406764
                  Source: uShK30bvrV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: uShK30bvrV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: HKhg.pdb source: uShK30bvrV.exe, LwGrjoPJzyBSZs.exe.0.dr
                  Source: Binary string: HKhg.pdbSHA256 source: uShK30bvrV.exe, LwGrjoPJzyBSZs.exe.0.dr
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,16_2_0041B42F
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,16_2_0040B53A
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0044D5E9 FindFirstFileExA,16_2_0044D5E9
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,16_2_004089A9
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00406AC2 FindFirstFileW,FindNextFileW,16_2_00406AC2
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,16_2_00407A8C
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,16_2_00418C69
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,16_2_00408DA7
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,16_2_00406F06

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49709 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49843 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49985 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49993 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49989 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49991 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49997 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49987 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49995 -> 172.86.115.221:3217
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49999 -> 172.86.115.221:3217
                  Source: Malware configuration extractorURLs: jacksonnnn233.theworkpc.com
                  Source: Malware configuration extractorIPs: 127.0.0.1
                  Source: Joe Sandbox ViewASN Name: PONYNETUS PONYNETUS
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004260F7 recv,16_2_004260F7
                  Source: global trafficDNS traffic detected: DNS query: jacksonnnn233.theworkpc.com
                  Source: LwGrjoPJzyBSZs.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: uShK30bvrV.exe, 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, LwGrjoPJzyBSZs.exe, 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: uShK30bvrV.exe, 00000000.00000002.2182474407.0000000003057000.00000004.00000800.00020000.00000000.sdmp, LwGrjoPJzyBSZs.exe, 0000000B.00000002.2284092681.00000000027D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000016_2_004099E4
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\uShK30bvrV.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,16_2_004159C6
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,16_2_004159C6
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,16_2_004159C6
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,16_2_00409B10
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2263044898.0000000001357000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 1532, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTR

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041BB77 SystemParametersInfoW,16_2_0041BB77

                  System Summary

                  barindex
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,16_2_004158B9
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_016AD3A40_2_016AD3A4
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_0753C5280_2_0753C528
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_0753EBE10_2_0753EBE1
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_0753A4980_2_0753A498
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_075391F80_2_075391F8
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_07538DC00_2_07538DC0
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_075389880_2_07538988
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_0753A8D00_2_0753A8D0
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeCode function: 0_2_0AF10D180_2_0AF10D18
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 11_2_00D9D3A411_2_00D9D3A4
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041D07116_2_0041D071
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004520D216_2_004520D2
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043D09816_2_0043D098
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043715016_2_00437150
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004361AA16_2_004361AA
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0042625416_2_00426254
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043137716_2_00431377
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043651C16_2_0043651C
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041E5DF16_2_0041E5DF
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0044C73916_2_0044C739
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004367C616_2_004367C6
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004267CB16_2_004267CB
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043C9DD16_2_0043C9DD
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00432A4916_2_00432A49
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00436A8D16_2_00436A8D
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043CC0C16_2_0043CC0C
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00436D4816_2_00436D48
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00434D2216_2_00434D22
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00426E7316_2_00426E73
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00440E2016_2_00440E20
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043CE3B16_2_0043CE3B
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00412F4516_2_00412F45
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00452F0016_2_00452F00
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00426FAD16_2_00426FAD
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: String function: 00401F66 appears 50 times
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: String function: 004020E7 appears 39 times
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: String function: 004338A5 appears 41 times
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: String function: 00433FB0 appears 55 times
                  Source: uShK30bvrV.exe, 00000000.00000002.2185766227.0000000005B70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2182474407.000000000314B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2186107721.000000000626A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2186107721.000000000626A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2186107721.000000000626A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameschtasks.exe.muij% vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2186107721.000000000626A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHKhg.exe6 vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000000.2065043084.0000000000BD2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHKhg.exe6 vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2186664890.0000000007540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs uShK30bvrV.exe
                  Source: uShK30bvrV.exe, 00000000.00000002.2180710118.000000000123E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs uShK30bvrV.exe
                  Source: uShK30bvrV.exeBinary or memory string: OriginalFilenameHKhg.exe6 vs uShK30bvrV.exe
                  Source: uShK30bvrV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: uShK30bvrV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: LwGrjoPJzyBSZs.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@21/16@2/2
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,16_2_00416AB7
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,16_2_0040E219
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,16_2_0041A63F
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,16_2_00419BC4
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile created: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMutant created: \Sessions\1\BaseNamedObjects\HgHqnJFEDox
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-EFKPJD
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2888:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5508:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6488:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5864:120:WilError_03
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF343.tmpJump to behavior
                  Source: uShK30bvrV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: uShK30bvrV.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: uShK30bvrV.exeVirustotal: Detection: 63%
                  Source: uShK30bvrV.exeReversingLabs: Detection: 83%
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile read: C:\Users\user\Desktop\uShK30bvrV.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\uShK30bvrV.exe "C:\Users\user\Desktop\uShK30bvrV.exe"
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Users\user\Desktop\uShK30bvrV.exe "C:\Users\user\Desktop\uShK30bvrV.exe"
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Users\user\Desktop\uShK30bvrV.exe "C:\Users\user\Desktop\uShK30bvrV.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess created: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Users\user\Desktop\uShK30bvrV.exe "C:\Users\user\Desktop\uShK30bvrV.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Users\user\Desktop\uShK30bvrV.exe "C:\Users\user\Desktop\uShK30bvrV.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess created: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: uShK30bvrV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: uShK30bvrV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: uShK30bvrV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: HKhg.pdb source: uShK30bvrV.exe, LwGrjoPJzyBSZs.exe.0.dr
                  Source: Binary string: HKhg.pdbSHA256 source: uShK30bvrV.exe, LwGrjoPJzyBSZs.exe.0.dr
                  Source: uShK30bvrV.exeStatic PE information: 0xE4E046EB [Thu Sep 6 07:51:07 2091 UTC]
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,16_2_0041BCE3
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004567E0 push eax; ret 16_2_004567FE
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0045B9DD push esi; ret 16_2_0045B9E6
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00463EF3 push ds; retf 16_2_00463EEC
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00455EAF push ecx; ret 16_2_00455EC2
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00433FF6 push ecx; ret 16_2_00434009
                  Source: uShK30bvrV.exeStatic PE information: section name: .text entropy: 7.8483856335627635
                  Source: LwGrjoPJzyBSZs.exe.0.drStatic PE information: section name: .text entropy: 7.8483856335627635
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00406128 ShellExecuteW,URLDownloadToFileW,16_2_00406128
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile created: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp"
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,16_2_00419BC4

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,16_2_0041BCE3
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 3380, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0040E54F Sleep,ExitProcess,16_2_0040E54F
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: 1640000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: 5020000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: 7EE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: 7760000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: 8EE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: 9EE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMemory allocated: D50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMemory allocated: 27A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMemory allocated: DB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMemory allocated: 6E50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMemory allocated: 7E50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMemory allocated: 7FE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMemory allocated: 8FE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,16_2_004198C2
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5908Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5762Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeWindow / User API: threadDelayed 960Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeWindow / User API: threadDelayed 8524Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeAPI coverage: 4.8 %
                  Source: C:\Users\user\Desktop\uShK30bvrV.exe TID: 5236Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6200Thread sleep count: 5908 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3276Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6128Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7148Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5356Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exe TID: 6156Thread sleep count: 252 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exe TID: 6156Thread sleep time: -126000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exe TID: 6416Thread sleep count: 960 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exe TID: 6416Thread sleep time: -2880000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exe TID: 6416Thread sleep count: 8524 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exe TID: 6416Thread sleep time: -25572000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe TID: 2820Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,16_2_0041B42F
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,16_2_0040B53A
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0044D5E9 FindFirstFileExA,16_2_0044D5E9
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,16_2_004089A9
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00406AC2 FindFirstFileW,FindNextFileW,16_2_00406AC2
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,16_2_00407A8C
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,16_2_00418C69
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,16_2_00408DA7
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,16_2_00406F06
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_0043A65D
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,16_2_0041BCE3
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00442554 mov eax, dword ptr fs:[00000030h]16_2_00442554
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0044E92E GetProcessHeap,16_2_0044E92E
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00434168
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_0043A65D
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00433B44
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00433CD7 SetUnhandledExceptionFilter,16_2_00433CD7
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe"
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMemory written: C:\Users\user\Desktop\uShK30bvrV.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe16_2_00410F36
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00418754 mouse_event,16_2_00418754
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Users\user\Desktop\uShK30bvrV.exe "C:\Users\user\Desktop\uShK30bvrV.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeProcess created: C:\Users\user\Desktop\uShK30bvrV.exe "C:\Users\user\Desktop\uShK30bvrV.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeProcess created: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"Jump to behavior
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerg
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager0
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager-
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerI
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerJD\e
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerV
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager_
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerJD\tel64 Family 6 Model 143:>
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager{
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerJD\
                  Source: uShK30bvrV.exe, 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00433E0A cpuid 16_2_00433E0A
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: EnumSystemLocalesW,16_2_004470AE
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetLocaleInfoW,16_2_004510BA
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,16_2_004511E3
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetLocaleInfoW,16_2_004512EA
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,16_2_004513B7
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetLocaleInfoW,16_2_00447597
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetLocaleInfoA,16_2_0040E679
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,16_2_00450A7F
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: EnumSystemLocalesW,16_2_00450CF7
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: EnumSystemLocalesW,16_2_00450D42
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: EnumSystemLocalesW,16_2_00450DDD
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,16_2_00450E6A
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeQueries volume information: C:\Users\user\Desktop\uShK30bvrV.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeQueries volume information: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,16_2_00434010
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0041A7A2 GetUserNameW,16_2_0041A7A2
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: 16_2_0044800F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,16_2_0044800F
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2263044898.0000000001357000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 1532, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data16_2_0040B21B
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\16_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: \key3.db16_2_0040B335
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\key3.dbJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\logins.jsonJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key3.dbJump to behavior
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\Desktop\uShK30bvrV.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-EFKPJDJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-EFKPJDJump to behavior
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.LwGrjoPJzyBSZs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.40ba380.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.uShK30bvrV.exe.4041d60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2263044898.0000000001357000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: uShK30bvrV.exe PID: 1532, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: LwGrjoPJzyBSZs.exe PID: 6572, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exeCode function: cmd.exe16_2_00405042
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  11
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Bypass User Account Control
                  1
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares211
                  Input Capture
                  1
                  Remote Access Software
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts2
                  Service Execution
                  Login Hook1
                  Windows Service
                  2
                  Software Packing
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object Model3
                  Clipboard Data
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                  Process Injection
                  1
                  Timestomp
                  LSA Secrets33
                  System Information Discovery
                  SSHKeylogging11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  Cached Domain Credentials121
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Bypass User Account Control
                  DCSync31
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Masquerading
                  Proc Filesystem3
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Access Token Manipulation
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd122
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589024 Sample: uShK30bvrV.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 46 jacksonnnn233.theworkpc.com 2->46 52 Suricata IDS alerts for network traffic 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 12 other signatures 2->58 8 uShK30bvrV.exe 7 2->8         started        12 LwGrjoPJzyBSZs.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\LwGrjoPJzyBSZs.exe, PE32 8->38 dropped 40 C:\...\LwGrjoPJzyBSZs.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmpF343.tmp, XML 8->42 dropped 44 C:\Users\user\AppData\...\uShK30bvrV.exe.log, ASCII 8->44 dropped 60 Uses schtasks.exe or at.exe to add and modify task schedules 8->60 62 Adds a directory exclusion to Windows Defender 8->62 64 Injects a PE file into a foreign processes 8->64 14 uShK30bvrV.exe 4 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        26 2 other processes 8->26 66 Antivirus detection for dropped file 12->66 68 Multi AV Scanner detection for dropped file 12->68 70 Contains functionality to bypass UAC (CMSTPLUA) 12->70 72 6 other signatures 12->72 22 LwGrjoPJzyBSZs.exe 12->22         started        24 schtasks.exe 1 12->24         started        signatures6 process7 dnsIp8 48 jacksonnnn233.theworkpc.com 172.86.115.221, 3217, 49709, 49843 PONYNETUS United States 14->48 50 127.0.0.1 unknown unknown 14->50 74 Detected Remcos RAT 14->74 76 Tries to harvest and steal browser information (history, passwords, etc) 14->76 78 Installs a global keyboard hook 14->78 80 Loading BitLocker PowerShell Module 18->80 28 WmiPrvSE.exe 18->28         started        30 conhost.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  uShK30bvrV.exe64%VirustotalBrowse
                  uShK30bvrV.exe83%ReversingLabsWin32.Trojan.Jalapeno
                  uShK30bvrV.exe100%AviraHEUR/AGEN.1309499
                  uShK30bvrV.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe100%AviraHEUR/AGEN.1309499
                  C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe83%ReversingLabsWin32.Trojan.Jalapeno
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  jacksonnnn233.theworkpc.com100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  jacksonnnn233.theworkpc.com
                  172.86.115.221
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    jacksonnnn233.theworkpc.comtrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpLwGrjoPJzyBSZs.exefalse
                      high
                      http://geoplugin.net/json.gp/CuShK30bvrV.exe, 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, LwGrjoPJzyBSZs.exe, 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameuShK30bvrV.exe, 00000000.00000002.2182474407.0000000003057000.00000004.00000800.00020000.00000000.sdmp, LwGrjoPJzyBSZs.exe, 0000000B.00000002.2284092681.00000000027D7000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          172.86.115.221
                          jacksonnnn233.theworkpc.comUnited States
                          53667PONYNETUStrue
                          IP
                          127.0.0.1
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1589024
                          Start date and time:2025-01-11 08:34:43 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 8m 27s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:18
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:uShK30bvrV.exe
                          renamed because original name is a hash value
                          Original Sample Name:e54d75beb808253cbb5c06bbe37211b9a7467c39dac776ea72df26be3b30f5ea.exe
                          Detection:MAL
                          Classification:mal100.rans.troj.spyw.expl.evad.winEXE@21/16@2/2
                          EGA Information:
                          • Successful, ratio: 75%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 58
                          • Number of non-executed functions: 215
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.107.246.45, 20.109.210.53
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target uShK30bvrV.exe, PID 1532 because there are no executed function
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtCreateKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          02:35:41API Interceptor6217286x Sleep call for process: uShK30bvrV.exe modified
                          02:35:45API Interceptor33x Sleep call for process: powershell.exe modified
                          02:35:52API Interceptor1x Sleep call for process: LwGrjoPJzyBSZs.exe modified
                          08:35:45Task SchedulerRun new task: LwGrjoPJzyBSZs path: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          jacksonnnn233.theworkpc.comnew policy.scr.exeGet hashmaliciousNanocore, XWormBrowse
                          • 78.159.112.29
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          PONYNETUSmiori.spc.elfGet hashmaliciousUnknownBrowse
                          • 107.189.6.73
                          cZO.exeGet hashmaliciousUnknownBrowse
                          • 107.189.28.6
                          file.exeGet hashmaliciousUnknownBrowse
                          • 205.185.126.56
                          file.exeGet hashmaliciousUnknownBrowse
                          • 205.185.126.56
                          file.exeGet hashmaliciousGhostRat, NitolBrowse
                          • 198.98.57.188
                          lx64.elfGet hashmaliciousUnknownBrowse
                          • 205.185.126.56
                          https://u48917305.ct.sendgrid.net/ls/click?upn=u001.ztQPJiWtq2gO8V-2Ftd7SxY9UCAq3VScTPSloeIw5UEMPd6e3nbPRvJ98moPTqmrdQ1eNbvwZHJ-2BEb4HrooVFNCTltmXW6SgRONKSmPzdFoWfDQT97cczFZ0vj7M2xBd2izDTi-2BL-2BoVqB8yVzV2GW7vOPvy3s9yVghrOS5vs-2BSnWyzJMkXQxVEReq4oLCDet7QAOvo_JkpSD-2Bg6VoLAQppUKMb-2BxDh4v4nbOeQFT31aoN-2FLkhvFCzY6wdlGM7RTNIi47OKR1tTaghG8tTKssArDNPSXAfX9wO6nsZ2FHn-2FunyaOti-2FaII-2FnbKYDXJOImW-2Bs9f4tYnWj8rqO7L0kp4KNRHBDo0iHoL8DEOGc8GMtzqzsIqERel6-2FxJyY4DBnsnUTOc2I4HCPKA6lxcCEXMtxEA1-2FnQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                          • 198.251.89.144
                          arm6.elfGet hashmaliciousMirai, MoobotBrowse
                          • 209.141.47.117
                          JkICQ13OOY.dllGet hashmaliciousUnknownBrowse
                          • 107.189.14.43
                          JkICQ13OOY.dllGet hashmaliciousUnknownBrowse
                          • 104.244.76.24
                          No context
                          No context
                          Process:C:\Users\user\Desktop\uShK30bvrV.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):530
                          Entropy (8bit):7.644658652708798
                          Encrypted:false
                          SSDEEP:12:CNvd5xeyku3bjgqUBIG2JnQF9/FkF5JhBTiHF9vUjXVJMlZNWnXYn:OfxJn3AqUBT2JolwhBggXyZuYn
                          MD5:CB8BE50953992B6A394FF8BE58304F28
                          SHA1:0650C04997B5186B1DF69C55E6B5DA79358AD49D
                          SHA-256:32C8767F20E39F7A8ECEF623B3E03689F1F8085C2F72371015A63053AA0950CD
                          SHA-512:512DDFA6B743940CFE98C6D527371A4E7F711D144278960393027787828298CAA1638C8DC3FA649E28FA4E6C61BD43FFDBF2C21C706D4D990EBBEE4AFB090A58
                          Malicious:false
                          Preview:....h.)\..qX..|.B..B>....[..5.......k..f...V.0.$g..^.2./.2.&.(e......J../C...u..wg..........P..W.jz..._....'.Q./T.3..'.._....;.... n..W.....l...PX......M.+RGA....$....E..O...3.........M.....e...w......i.:7.A..~f+:.6b...x.N.C.C......w/.8........z.3.Hq....^.p.^vf...TW=...%H.:h.o.n*..h].s..*_.rB.....-Yy1.mC.......J.....]..y+,.8.}....]0....$..cV....o.=a.i?.].~).".....y..g9.+......U....iL..;~......b.%.F.C...i}...5E....|...4N.9n.:...<...iJ...&z.t.......x.lL.^g:..L.<..U.N.x......yG:?U...q.tf./.5..
                          Process:C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.34331486778365
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                          Malicious:false
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                          Process:C:\Users\user\Desktop\uShK30bvrV.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.34331486778365
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                          Malicious:true
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):2232
                          Entropy (8bit):5.379401388151058
                          Encrypted:false
                          SSDEEP:48:fWSU4y4RQmTpoUeW+gZ9tK8NPZHUxL7u1iMugeC/ZPUyus:fLHyIFTmLgZ2KRHWLOug8s
                          MD5:A6B4842283E7224B4E54457126CD8D9F
                          SHA1:E4F2678896DFEAD1A40BCD9F9CB356B41D9A5FEF
                          SHA-256:78CFFE0202C0F977B348AA571B4BB93791503F679FBA52CCB238F7079D129FBB
                          SHA-512:56DF9108664BD9FDDECE72BEABA54208A9195E7DFD6F21ED6F93F43D2F78FB59CC98D864FE62146FBFCB0EC2E89D506E823B2B4408D7B4DA16F0907442741ADB
                          Malicious:false
                          Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..<...............i..VdqF...|...........System.Configuration8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                          File Type:XML 1.0 document, ASCII text
                          Category:dropped
                          Size (bytes):1587
                          Entropy (8bit):5.11916296063462
                          Encrypted:false
                          SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHZoxvn:cgergYrFdOFzOzN33ODOiDdKrsuTiv
                          MD5:EBCA36904B8E62C8C08153300D7B0787
                          SHA1:4680205D90A0DE2DEE0CA7FD8688337379B011DE
                          SHA-256:F484C18801058CC9FB58BA85B0264BD78C356452391FF244A393C55EB37A37B5
                          SHA-512:F5FED52AEF74A3523B03DD1EC34871278E9599C7153E4F44EECFD3B0D56C6CDBBE3216D502F813A4E22C6F212F9BB1B62E32A1D59856E6BF0ECB0D9B603ECDD0
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                          Process:C:\Users\user\Desktop\uShK30bvrV.exe
                          File Type:XML 1.0 document, ASCII text
                          Category:dropped
                          Size (bytes):1587
                          Entropy (8bit):5.11916296063462
                          Encrypted:false
                          SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHZoxvn:cgergYrFdOFzOzN33ODOiDdKrsuTiv
                          MD5:EBCA36904B8E62C8C08153300D7B0787
                          SHA1:4680205D90A0DE2DEE0CA7FD8688337379B011DE
                          SHA-256:F484C18801058CC9FB58BA85B0264BD78C356452391FF244A393C55EB37A37B5
                          SHA-512:F5FED52AEF74A3523B03DD1EC34871278E9599C7153E4F44EECFD3B0D56C6CDBBE3216D502F813A4E22C6F212F9BB1B62E32A1D59856E6BF0ECB0D9B603ECDD0
                          Malicious:true
                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                          Process:C:\Users\user\Desktop\uShK30bvrV.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):1035776
                          Entropy (8bit):7.735776219965567
                          Encrypted:false
                          SSDEEP:24576:e4Z8z1TQIYt/R6Zg2k85kP0vv4EvfiYPgPTatiI1LHx:e4SzmIoKNCPoZntPgPTatiIlx
                          MD5:CBE2A525A70F1AE12ED19DB3D2CE8A9A
                          SHA1:C9EBBC22C4C793BD7AB2651B997AEA1FB6651715
                          SHA-256:E54D75BEB808253CBB5C06BBE37211B9A7467C39DAC776EA72DF26BE3B30F5EA
                          SHA-512:2B77C70E595B2237409769D99B7C3448F70853780FD865D7EB721D421D9CABC007FDD7A2E0EE7B401FEA5951230BEE848BB33D2C2AA0FFAEE84EF3CAE8BC7FD1
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 83%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F................0.................. ........@.. ....................... ............@.................................n...O.......l...............................p............................................ ............... ..H............text....... ...................... ..`.rsrc...l...........................@..@.reloc..............................@..B........................H........d...K......`.......p............................................0..M.........}......}.....(.....sn......(.............s....o....}g......o...s....o.....*....0...........s......o.....*".(.....*.0...........s".....o.....*..0..+.........,..{.......+....,...{....o........(.....*..0............o ....+..*.0..S..........+4...+.......(........X...(..../..o!......+....-....X...o".../..o!......+....-.*..0..............o#.......o!...Y..........,T...($.....b..(%....b`..(&...`....
                          Process:C:\Users\user\Desktop\uShK30bvrV.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.735776219965567
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:uShK30bvrV.exe
                          File size:1'035'776 bytes
                          MD5:cbe2a525a70f1ae12ed19db3d2ce8a9a
                          SHA1:c9ebbc22c4c793bd7ab2651b997aea1fb6651715
                          SHA256:e54d75beb808253cbb5c06bbe37211b9a7467c39dac776ea72df26be3b30f5ea
                          SHA512:2b77c70e595b2237409769d99b7c3448f70853780fd865d7eb721d421d9cabc007fdd7a2e0ee7b401fea5951230bee848bb33d2c2aa0ffaee84ef3cae8bc7fd1
                          SSDEEP:24576:e4Z8z1TQIYt/R6Zg2k85kP0vv4EvfiYPgPTatiI1LHx:e4SzmIoKNCPoZntPgPTatiIlx
                          TLSH:8525E044EE159D12D179CE740E73E2B11EAC2FCAE510D1C26AD97EDBF9F3A213811292
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F................0.................. ........@.. ....................... ............@................................
                          Icon Hash:32ed8e8e8ca8acb2
                          Entrypoint:0x4ed8c2
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0xE4E046EB [Thu Sep 6 07:51:07 2091 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xed86e0x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xee0000x10e6c.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1000000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xebc0c0x70.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xeb8c80xeba000f17b5624dac50c47cef549b327b21caFalse0.9373943136604774data7.8483856335627635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xee0000x10e6c0x11000c4f28a84c67c05e2ebb363a1b895552fFalse0.053179572610294115DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2.000000, slope 2.0143023.79379493124495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x1000000xc0x200569a74a093bbdd3c13646ad016a60eb7False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xee1300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.04304684727315746
                          RT_GROUP_ICON0xfe9580x14data1.0
                          RT_VERSION0xfe96c0x314data0.4365482233502538
                          RT_MANIFEST0xfec800x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2025-01-11T08:35:32.954262+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549999172.86.115.2213217TCP
                          2025-01-11T08:36:09.816459+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549709172.86.115.2213217TCP
                          2025-01-11T08:36:34.216958+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549843172.86.115.2213217TCP
                          2025-01-11T08:36:58.639607+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549985172.86.115.2213217TCP
                          2025-01-11T08:37:23.296541+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549987172.86.115.2213217TCP
                          2025-01-11T08:37:47.945462+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549989172.86.115.2213217TCP
                          2025-01-11T08:38:12.847451+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549991172.86.115.2213217TCP
                          2025-01-11T08:38:37.595939+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549993172.86.115.2213217TCP
                          2025-01-11T08:39:02.062540+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549995172.86.115.2213217TCP
                          2025-01-11T08:39:26.579141+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549997172.86.115.2213217TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 11, 2025 08:35:48.429492950 CET497093217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:35:48.434428930 CET321749709172.86.115.221192.168.2.5
                          Jan 11, 2025 08:35:48.434533119 CET497093217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:35:48.440320015 CET497093217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:35:48.445175886 CET321749709172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:09.815807104 CET321749709172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:09.816458941 CET497093217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:09.816549063 CET497093217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:09.821418047 CET321749709172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:12.861663103 CET498433217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:12.866569042 CET321749843172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:12.866672039 CET498433217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:12.870255947 CET498433217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:12.875123978 CET321749843172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:34.216876030 CET321749843172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:34.216958046 CET498433217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:34.217053890 CET498433217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:34.221867085 CET321749843172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:37.252165079 CET499853217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:37.257055044 CET321749985172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:37.257163048 CET499853217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:37.261883020 CET499853217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:37.266678095 CET321749985172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:58.639424086 CET321749985172.86.115.221192.168.2.5
                          Jan 11, 2025 08:36:58.639606953 CET499853217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:58.639607906 CET499853217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:36:58.644522905 CET321749985172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:01.908049107 CET499873217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:01.913021088 CET321749987172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:01.913142920 CET499873217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:01.917582989 CET499873217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:01.922522068 CET321749987172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:23.296468019 CET321749987172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:23.296540976 CET499873217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:23.296631098 CET499873217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:23.301351070 CET321749987172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:26.579607010 CET499893217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:26.584526062 CET321749989172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:26.584630013 CET499893217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:26.590049982 CET499893217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:26.594854116 CET321749989172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:47.941559076 CET321749989172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:47.945461988 CET499893217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:47.945497036 CET499893217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:47.950310946 CET321749989172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:51.457592964 CET499913217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:51.463181019 CET321749991172.86.115.221192.168.2.5
                          Jan 11, 2025 08:37:51.463304043 CET499913217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:51.467608929 CET499913217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:37:51.472454071 CET321749991172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:12.847373962 CET321749991172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:12.847450972 CET499913217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:12.847506046 CET499913217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:12.852421999 CET321749991172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:16.204591990 CET499933217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:16.209630013 CET321749993172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:16.209705114 CET499933217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:16.215244055 CET499933217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:16.220068932 CET321749993172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:37.595813036 CET321749993172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:37.595938921 CET499933217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:37.595938921 CET499933217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:37.600745916 CET321749993172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:40.688829899 CET499953217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:40.694107056 CET321749995172.86.115.221192.168.2.5
                          Jan 11, 2025 08:38:40.694190979 CET499953217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:40.697635889 CET499953217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:38:40.702476978 CET321749995172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:02.062454939 CET321749995172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:02.062540054 CET499953217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:02.062561035 CET499953217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:02.067326069 CET321749995172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:05.205586910 CET499973217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:05.210458040 CET321749997172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:05.210530043 CET499973217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:05.216124058 CET499973217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:05.220879078 CET321749997172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:26.579044104 CET321749997172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:26.579140902 CET499973217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:26.579183102 CET499973217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:26.584002018 CET321749997172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:29.907062054 CET499993217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:29.913152933 CET321749999172.86.115.221192.168.2.5
                          Jan 11, 2025 08:39:29.913233995 CET499993217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:29.916421890 CET499993217192.168.2.5172.86.115.221
                          Jan 11, 2025 08:39:29.922532082 CET321749999172.86.115.221192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 11, 2025 08:35:48.277861118 CET6322353192.168.2.51.1.1.1
                          Jan 11, 2025 08:35:48.401890039 CET53632231.1.1.1192.168.2.5
                          Jan 11, 2025 08:37:51.282381058 CET6012653192.168.2.51.1.1.1
                          Jan 11, 2025 08:37:51.456196070 CET53601261.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 11, 2025 08:35:48.277861118 CET192.168.2.51.1.1.10x9becStandard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
                          Jan 11, 2025 08:37:51.282381058 CET192.168.2.51.1.1.10xb800Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 11, 2025 08:35:48.401890039 CET1.1.1.1192.168.2.50x9becNo error (0)jacksonnnn233.theworkpc.com172.86.115.221A (IP address)IN (0x0001)false
                          Jan 11, 2025 08:37:51.456196070 CET1.1.1.1192.168.2.50xb800No error (0)jacksonnnn233.theworkpc.com172.86.115.221A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:02:35:35
                          Start date:11/01/2025
                          Path:C:\Users\user\Desktop\uShK30bvrV.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\uShK30bvrV.exe"
                          Imagebase:0xbd0000
                          File size:1'035'776 bytes
                          MD5 hash:CBE2A525A70F1AE12ED19DB3D2CE8A9A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2183452949.0000000004029000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low
                          Has exited:true

                          Target ID:3
                          Start time:02:35:44
                          Start date:11/01/2025
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\uShK30bvrV.exe"
                          Imagebase:0x3f0000
                          File size:433'152 bytes
                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:02:35:44
                          Start date:11/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:02:35:44
                          Start date:11/01/2025
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"
                          Imagebase:0x3f0000
                          File size:433'152 bytes
                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:6
                          Start time:02:35:44
                          Start date:11/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:7
                          Start time:02:35:44
                          Start date:11/01/2025
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmpF343.tmp"
                          Imagebase:0xac0000
                          File size:187'904 bytes
                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:8
                          Start time:02:35:44
                          Start date:11/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:9
                          Start time:02:35:45
                          Start date:11/01/2025
                          Path:C:\Users\user\Desktop\uShK30bvrV.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\uShK30bvrV.exe"
                          Imagebase:0x280000
                          File size:1'035'776 bytes
                          MD5 hash:CBE2A525A70F1AE12ED19DB3D2CE8A9A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:10
                          Start time:02:35:45
                          Start date:11/01/2025
                          Path:C:\Users\user\Desktop\uShK30bvrV.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\uShK30bvrV.exe"
                          Imagebase:0x620000
                          File size:1'035'776 bytes
                          MD5 hash:CBE2A525A70F1AE12ED19DB3D2CE8A9A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.4543600798.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Target ID:11
                          Start time:02:35:45
                          Start date:11/01/2025
                          Path:C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                          Imagebase:0x2c0000
                          File size:1'035'776 bytes
                          MD5 hash:CBE2A525A70F1AE12ED19DB3D2CE8A9A
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 83%, ReversingLabs
                          Reputation:low
                          Has exited:true

                          Target ID:12
                          Start time:02:35:47
                          Start date:11/01/2025
                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                          Imagebase:0x7ff6ef0c0000
                          File size:496'640 bytes
                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                          Has elevated privileges:true
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:14
                          Start time:02:35:55
                          Start date:11/01/2025
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LwGrjoPJzyBSZs" /XML "C:\Users\user\AppData\Local\Temp\tmp1D31.tmp"
                          Imagebase:0xac0000
                          File size:187'904 bytes
                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:15
                          Start time:02:35:55
                          Start date:11/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:16
                          Start time:02:35:55
                          Start date:11/01/2025
                          Path:C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe"
                          Imagebase:0xbb0000
                          File size:1'035'776 bytes
                          MD5 hash:CBE2A525A70F1AE12ED19DB3D2CE8A9A
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.2263044898.0000000001357000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:9.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:161
                            Total number of Limit Nodes:11
                            execution_graph 28429 16a4668 28430 16a467a 28429->28430 28431 16a4686 28430->28431 28433 16a4778 28430->28433 28434 16a479d 28433->28434 28438 16a4878 28434->28438 28442 16a4888 28434->28442 28440 16a4888 28438->28440 28439 16a498c 28439->28439 28440->28439 28446 16a44b4 28440->28446 28444 16a48af 28442->28444 28443 16a498c 28444->28443 28445 16a44b4 CreateActCtxA 28444->28445 28445->28443 28447 16a5918 CreateActCtxA 28446->28447 28449 16a59db 28447->28449 28607 16ad478 28608 16ad4be GetCurrentProcess 28607->28608 28610 16ad509 28608->28610 28611 16ad510 GetCurrentThread 28608->28611 28610->28611 28612 16ad54d GetCurrentProcess 28611->28612 28613 16ad546 28611->28613 28614 16ad583 28612->28614 28613->28612 28615 16ad5ab GetCurrentThreadId 28614->28615 28616 16ad5dc 28615->28616 28450 753c096 28451 753bf60 28450->28451 28452 753c0a0 28450->28452 28457 753e8c0 28452->28457 28470 753e91e 28452->28470 28484 753e8b0 28452->28484 28453 753c10d 28458 753e8da 28457->28458 28466 753e8fe 28458->28466 28497 753f1bf 28458->28497 28501 753f2b9 28458->28501 28505 753f439 28458->28505 28509 753ee9b 28458->28509 28513 753ed15 28458->28513 28517 753ef13 28458->28517 28522 753edac 28458->28522 28530 753f224 28458->28530 28535 753f0c6 28458->28535 28539 753f29e 28458->28539 28466->28453 28471 753e8ac 28470->28471 28473 753e921 28470->28473 28472 753e8fe 28471->28472 28474 753ef13 2 API calls 28471->28474 28475 753ed15 2 API calls 28471->28475 28476 753ee9b 2 API calls 28471->28476 28477 753f439 2 API calls 28471->28477 28478 753f2b9 2 API calls 28471->28478 28479 753f1bf 2 API calls 28471->28479 28480 753f29e 2 API calls 28471->28480 28481 753f0c6 2 API calls 28471->28481 28482 753f224 2 API calls 28471->28482 28483 753edac 4 API calls 28471->28483 28472->28453 28473->28453 28474->28472 28475->28472 28476->28472 28477->28472 28478->28472 28479->28472 28480->28472 28481->28472 28482->28472 28483->28472 28485 753e8da 28484->28485 28486 753ef13 2 API calls 28485->28486 28487 753e8fe 28485->28487 28488 753ed15 2 API calls 28485->28488 28489 753ee9b 2 API calls 28485->28489 28490 753f439 2 API calls 28485->28490 28491 753f2b9 2 API calls 28485->28491 28492 753f1bf 2 API calls 28485->28492 28493 753f29e 2 API calls 28485->28493 28494 753f0c6 2 API calls 28485->28494 28495 753f224 2 API calls 28485->28495 28496 753edac 4 API calls 28485->28496 28486->28487 28487->28453 28488->28487 28489->28487 28490->28487 28491->28487 28492->28487 28493->28487 28494->28487 28495->28487 28496->28487 28498 753f1c3 28497->28498 28543 753b0f1 28498->28543 28547 753b0f8 28498->28547 28551 753b340 28501->28551 28555 753b338 28501->28555 28502 753ed70 28502->28466 28559 753b1a1 28505->28559 28563 753b1a8 28505->28563 28506 753ed70 28506->28466 28567 753b828 28509->28567 28571 753b830 28509->28571 28510 753eec1 28575 753b9c8 28513->28575 28579 753b9bc 28513->28579 28583 753f900 28517->28583 28589 753f948 28517->28589 28594 753f939 28517->28594 28518 753ed70 28518->28466 28599 753b280 28522->28599 28603 753b279 28522->28603 28523 753f701 28524 753edca 28524->28523 28528 753b340 WriteProcessMemory 28524->28528 28529 753b338 WriteProcessMemory 28524->28529 28525 753eef7 28525->28466 28528->28525 28529->28525 28531 753f22a 28530->28531 28533 753b340 WriteProcessMemory 28531->28533 28534 753b338 WriteProcessMemory 28531->28534 28532 753eef7 28532->28466 28533->28532 28534->28532 28537 753b340 WriteProcessMemory 28535->28537 28538 753b338 WriteProcessMemory 28535->28538 28536 753f0ee 28537->28536 28538->28536 28540 753f1c3 28539->28540 28540->28539 28541 753b0f1 ResumeThread 28540->28541 28542 753b0f8 ResumeThread 28540->28542 28541->28540 28542->28540 28544 753b0f8 ResumeThread 28543->28544 28546 753b169 28544->28546 28546->28498 28548 753b138 ResumeThread 28547->28548 28550 753b169 28548->28550 28550->28498 28552 753b388 WriteProcessMemory 28551->28552 28554 753b3df 28552->28554 28554->28502 28556 753b340 WriteProcessMemory 28555->28556 28558 753b3df 28556->28558 28558->28502 28560 753b1ed Wow64SetThreadContext 28559->28560 28562 753b235 28560->28562 28562->28506 28564 753b1ed Wow64SetThreadContext 28563->28564 28566 753b235 28564->28566 28566->28506 28568 753b831 ReadProcessMemory 28567->28568 28570 753b8bf 28568->28570 28570->28510 28572 753b87b ReadProcessMemory 28571->28572 28574 753b8bf 28572->28574 28574->28510 28576 753ba51 28575->28576 28576->28576 28577 753bbb6 CreateProcessA 28576->28577 28578 753bc13 28577->28578 28578->28578 28580 753b9c8 CreateProcessA 28579->28580 28582 753bc13 28580->28582 28582->28582 28584 753f93f 28583->28584 28586 753f90e 28583->28586 28587 753b1a1 Wow64SetThreadContext 28584->28587 28588 753b1a8 Wow64SetThreadContext 28584->28588 28585 753f973 28585->28518 28586->28518 28587->28585 28588->28585 28590 753f95d 28589->28590 28592 753b1a1 Wow64SetThreadContext 28590->28592 28593 753b1a8 Wow64SetThreadContext 28590->28593 28591 753f973 28591->28518 28592->28591 28593->28591 28595 753f948 28594->28595 28597 753b1a1 Wow64SetThreadContext 28595->28597 28598 753b1a8 Wow64SetThreadContext 28595->28598 28596 753f973 28596->28518 28597->28596 28598->28596 28600 753b2c0 VirtualAllocEx 28599->28600 28602 753b2fd 28600->28602 28602->28524 28604 753b2c0 VirtualAllocEx 28603->28604 28606 753b2fd 28604->28606 28606->28524 28617 16aacf0 28621 16aade8 28617->28621 28626 16aadd8 28617->28626 28618 16aacff 28622 16aadf9 28621->28622 28623 16aae1c 28621->28623 28622->28623 28624 16ab020 GetModuleHandleW 28622->28624 28623->28618 28625 16ab04d 28624->28625 28625->28618 28627 16aae1c 28626->28627 28628 16aadf9 28626->28628 28627->28618 28628->28627 28629 16ab020 GetModuleHandleW 28628->28629 28630 16ab04d 28629->28630 28630->28618 28638 16ad6c0 DuplicateHandle 28639 16ad756 28638->28639 28631 753fb88 28632 753fd13 28631->28632 28634 753fbae 28631->28634 28634->28632 28635 753b58c 28634->28635 28636 753fe08 PostMessageW 28635->28636 28637 753fe74 28636->28637 28637->28634
                            Memory Dump Source
                            • Source File: 00000000.00000002.2188709965.000000000AF10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AF10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_af10000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a1c340de27599d97052b9d109682079690576560f174e53165dc27923409fb9f
                            • Instruction ID: b7265fd7e66d499b7fb82aaaac2210ef0e1b9b105f2e98fcc14f266deafc6fae
                            • Opcode Fuzzy Hash: a1c340de27599d97052b9d109682079690576560f174e53165dc27923409fb9f
                            • Instruction Fuzzy Hash: 0602ED31A017448FDB25DB75C890BAEBBF6AF8A300F5485AED146DB291CF38E841CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 01f7bdd8f7c92dc1dd66a881bbe9d7376f173e86cf15255d4c6e4778d73d2700
                            • Instruction ID: e719de8bb0f192991bbddcbff0f88478229e5ca675ba8332d5452282aa1e6918
                            • Opcode Fuzzy Hash: 01f7bdd8f7c92dc1dd66a881bbe9d7376f173e86cf15255d4c6e4778d73d2700
                            • Instruction Fuzzy Hash: B351F5B4D19248CBDB04CFA9D4486FDBBF9FB4E300F14A42AD40AB72A5DB345445CB64
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: babaea49dab1ccb87ee00689deed71cd1ff9bb3c168f3fd2f6bf34e83ce0761d
                            • Instruction ID: c45955618fdb1a3ad85a827d5c75a8477bdf931ed82adc816b3a5ca21da2674a
                            • Opcode Fuzzy Hash: babaea49dab1ccb87ee00689deed71cd1ff9bb3c168f3fd2f6bf34e83ce0761d
                            • Instruction Fuzzy Hash: 03510BB1D55729CAEB28CF66C8057DAF7F6BF8A310F14C5AAD40DA6251EB700A858F40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 294 16ad468-16ad507 GetCurrentProcess 298 16ad509-16ad50f 294->298 299 16ad510-16ad544 GetCurrentThread 294->299 298->299 300 16ad54d-16ad581 GetCurrentProcess 299->300 301 16ad546-16ad54c 299->301 302 16ad58a-16ad5a5 call 16ad647 300->302 303 16ad583-16ad589 300->303 301->300 307 16ad5ab-16ad5da GetCurrentThreadId 302->307 303->302 308 16ad5dc-16ad5e2 307->308 309 16ad5e3-16ad645 307->309 308->309
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 016AD4F6
                            • GetCurrentThread.KERNEL32 ref: 016AD533
                            • GetCurrentProcess.KERNEL32 ref: 016AD570
                            • GetCurrentThreadId.KERNEL32 ref: 016AD5C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 2217ebec37e07528d0c2c89da110e69b250ab9357ea9ea8d76b2c077ebb2cd6d
                            • Instruction ID: a854ea3ee08e0b7105d822a606e354c2386547d92d7640c802fefe0ab943345f
                            • Opcode Fuzzy Hash: 2217ebec37e07528d0c2c89da110e69b250ab9357ea9ea8d76b2c077ebb2cd6d
                            • Instruction Fuzzy Hash: C85154B09012498FDB44DFA9D948BAEBBF5FF48314F208469E509A73A0D7389984CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 316 16ad478-16ad507 GetCurrentProcess 320 16ad509-16ad50f 316->320 321 16ad510-16ad544 GetCurrentThread 316->321 320->321 322 16ad54d-16ad581 GetCurrentProcess 321->322 323 16ad546-16ad54c 321->323 324 16ad58a-16ad5a5 call 16ad647 322->324 325 16ad583-16ad589 322->325 323->322 329 16ad5ab-16ad5da GetCurrentThreadId 324->329 325->324 330 16ad5dc-16ad5e2 329->330 331 16ad5e3-16ad645 329->331 330->331
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 016AD4F6
                            • GetCurrentThread.KERNEL32 ref: 016AD533
                            • GetCurrentProcess.KERNEL32 ref: 016AD570
                            • GetCurrentThreadId.KERNEL32 ref: 016AD5C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 4aaf95932272ee74e2d48b04b26ec92f8abacec013ac8b9ed8b5dc8483de4c13
                            • Instruction ID: 0461706fd3cc6398d97fc38fbbf0169560cf4e301495d25a4991fbaafa075162
                            • Opcode Fuzzy Hash: 4aaf95932272ee74e2d48b04b26ec92f8abacec013ac8b9ed8b5dc8483de4c13
                            • Instruction Fuzzy Hash: C15154B09002098FDB54DFAAD948BAEBBF5FF88314F208459E509A7360D778A944CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 404 753b9bc-753ba5d 407 753ba96-753bab6 404->407 408 753ba5f-753ba69 404->408 415 753bab8-753bac2 407->415 416 753baef-753bb1e 407->416 408->407 409 753ba6b-753ba6d 408->409 410 753ba90-753ba93 409->410 411 753ba6f-753ba79 409->411 410->407 413 753ba7b 411->413 414 753ba7d-753ba8c 411->414 413->414 414->414 418 753ba8e 414->418 415->416 417 753bac4-753bac6 415->417 424 753bb20-753bb2a 416->424 425 753bb57-753bc11 CreateProcessA 416->425 419 753bae9-753baec 417->419 420 753bac8-753bad2 417->420 418->410 419->416 422 753bad6-753bae5 420->422 423 753bad4 420->423 422->422 426 753bae7 422->426 423->422 424->425 427 753bb2c-753bb2e 424->427 436 753bc13-753bc19 425->436 437 753bc1a-753bca0 425->437 426->419 429 753bb51-753bb54 427->429 430 753bb30-753bb3a 427->430 429->425 431 753bb3e-753bb4d 430->431 432 753bb3c 430->432 431->431 434 753bb4f 431->434 432->431 434->429 436->437 447 753bca2-753bca6 437->447 448 753bcb0-753bcb4 437->448 447->448 449 753bca8 447->449 450 753bcb6-753bcba 448->450 451 753bcc4-753bcc8 448->451 449->448 450->451 452 753bcbc 450->452 453 753bcca-753bcce 451->453 454 753bcd8-753bcdc 451->454 452->451 453->454 455 753bcd0 453->455 456 753bcee-753bcf5 454->456 457 753bcde-753bce4 454->457 455->454 458 753bcf7-753bd06 456->458 459 753bd0c 456->459 457->456 458->459 461 753bd0d 459->461 461->461
                            APIs
                            • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0753BBFE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: b016a01b5d8ff2984d56c01165d20170c71d7e0eb25f0db8e7b92ca5fb7a8232
                            • Instruction ID: 7973048e6dfa952177fd08e5fb982a9395e08e85b0ffbe15c5f82a892087df80
                            • Opcode Fuzzy Hash: b016a01b5d8ff2984d56c01165d20170c71d7e0eb25f0db8e7b92ca5fb7a8232
                            • Instruction Fuzzy Hash: 26A17DB1D0061ACFDB24CFA8C8417EDBBB2FF44314F14816AD819A72A0DB749985CF92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 462 753b9c8-753ba5d 464 753ba96-753bab6 462->464 465 753ba5f-753ba69 462->465 472 753bab8-753bac2 464->472 473 753baef-753bb1e 464->473 465->464 466 753ba6b-753ba6d 465->466 467 753ba90-753ba93 466->467 468 753ba6f-753ba79 466->468 467->464 470 753ba7b 468->470 471 753ba7d-753ba8c 468->471 470->471 471->471 475 753ba8e 471->475 472->473 474 753bac4-753bac6 472->474 481 753bb20-753bb2a 473->481 482 753bb57-753bc11 CreateProcessA 473->482 476 753bae9-753baec 474->476 477 753bac8-753bad2 474->477 475->467 476->473 479 753bad6-753bae5 477->479 480 753bad4 477->480 479->479 483 753bae7 479->483 480->479 481->482 484 753bb2c-753bb2e 481->484 493 753bc13-753bc19 482->493 494 753bc1a-753bca0 482->494 483->476 486 753bb51-753bb54 484->486 487 753bb30-753bb3a 484->487 486->482 488 753bb3e-753bb4d 487->488 489 753bb3c 487->489 488->488 491 753bb4f 488->491 489->488 491->486 493->494 504 753bca2-753bca6 494->504 505 753bcb0-753bcb4 494->505 504->505 506 753bca8 504->506 507 753bcb6-753bcba 505->507 508 753bcc4-753bcc8 505->508 506->505 507->508 509 753bcbc 507->509 510 753bcca-753bcce 508->510 511 753bcd8-753bcdc 508->511 509->508 510->511 512 753bcd0 510->512 513 753bcee-753bcf5 511->513 514 753bcde-753bce4 511->514 512->511 515 753bcf7-753bd06 513->515 516 753bd0c 513->516 514->513 515->516 518 753bd0d 516->518 518->518
                            APIs
                            • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0753BBFE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: e78ac0a145d3063388d19b0a5db9fce7b6b6c9f419e79cc7316350d12482b3a9
                            • Instruction ID: 2463f388ff66fd32dbd78b82bf549cf88903d9cdc7a41a7ab9105a021364308d
                            • Opcode Fuzzy Hash: e78ac0a145d3063388d19b0a5db9fce7b6b6c9f419e79cc7316350d12482b3a9
                            • Instruction Fuzzy Hash: D9915CB1D0061ACFDB24DF68C8417EEBBB2FF44314F14816AD819A72A0DB759985CF92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 519 16aade8-16aadf7 520 16aadf9-16aae06 call 16a9414 519->520 521 16aae23-16aae27 519->521 528 16aae08 520->528 529 16aae1c 520->529 523 16aae3b-16aae7c 521->523 524 16aae29-16aae33 521->524 530 16aae89-16aae97 523->530 531 16aae7e-16aae86 523->531 524->523 574 16aae0e call 16ab070 528->574 575 16aae0e call 16ab080 528->575 529->521 532 16aaebb-16aaebd 530->532 533 16aae99-16aae9e 530->533 531->530 538 16aaec0-16aaec7 532->538 535 16aaea9 533->535 536 16aaea0-16aaea7 call 16aa150 533->536 534 16aae14-16aae16 534->529 537 16aaf58-16ab018 534->537 542 16aaeab-16aaeb9 535->542 536->542 569 16ab01a-16ab01d 537->569 570 16ab020-16ab04b GetModuleHandleW 537->570 539 16aaec9-16aaed1 538->539 540 16aaed4-16aaedb 538->540 539->540 543 16aaee8-16aaef1 call 16aa160 540->543 544 16aaedd-16aaee5 540->544 542->538 550 16aaefe-16aaf03 543->550 551 16aaef3-16aaefb 543->551 544->543 552 16aaf21-16aaf2e 550->552 553 16aaf05-16aaf0c 550->553 551->550 559 16aaf30-16aaf4e 552->559 560 16aaf51-16aaf57 552->560 553->552 555 16aaf0e-16aaf1e call 16aa170 call 16aa180 553->555 555->552 559->560 569->570 571 16ab04d-16ab053 570->571 572 16ab054-16ab068 570->572 571->572 574->534 575->534
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 016AB03E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 44017a7a100f5bf0096970fe32aa59294695aded5cd22074168f7b35bcee38d6
                            • Instruction ID: 3534a4cb21b7da19723a9867d53a900bd80128c789516b94b12a7693a8f597b6
                            • Opcode Fuzzy Hash: 44017a7a100f5bf0096970fe32aa59294695aded5cd22074168f7b35bcee38d6
                            • Instruction Fuzzy Hash: DE712270A00B058FDB24DFA9D94076ABBF6BF88200F00892ED58AD7B50D735E849CF94

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 576 16a44b4-16a59d9 CreateActCtxA 579 16a59db-16a59e1 576->579 580 16a59e2-16a5a3c 576->580 579->580 587 16a5a4b-16a5a4f 580->587 588 16a5a3e-16a5a41 580->588 589 16a5a60 587->589 590 16a5a51-16a5a5d 587->590 588->587 591 16a5a61 589->591 590->589 591->591
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 016A59C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 8d110c363b00854063319a7b5cf5cb25b4dc88ca7be7500a6e4cadd2ecac18cb
                            • Instruction ID: 02ef6c5ac4d3c2361076af9e494647f3c15c2f0cfcd0a7da3a9d18babde8e3bc
                            • Opcode Fuzzy Hash: 8d110c363b00854063319a7b5cf5cb25b4dc88ca7be7500a6e4cadd2ecac18cb
                            • Instruction Fuzzy Hash: 4A4115B1C0071DCBDB24CFAAC884B8EBBF5BF45304F20805AD509AB260DB755946CF90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 593 16a590c-16a59d9 CreateActCtxA 595 16a59db-16a59e1 593->595 596 16a59e2-16a5a3c 593->596 595->596 603 16a5a4b-16a5a4f 596->603 604 16a5a3e-16a5a41 596->604 605 16a5a60 603->605 606 16a5a51-16a5a5d 603->606 604->603 607 16a5a61 605->607 606->605 607->607
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 016A59C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 5ca49c065650df6f818808665d1b61e997773b63cf2f7ca28a0c2102dbad9053
                            • Instruction ID: 44817fab29c646bdc70ddee51c072150e34f2d8f368f403840994ed3aba668d7
                            • Opcode Fuzzy Hash: 5ca49c065650df6f818808665d1b61e997773b63cf2f7ca28a0c2102dbad9053
                            • Instruction Fuzzy Hash: F54123B1D00759CFDB24CFAAC884BCEBBB5BF49304F20805AD51AAB261DB756946CF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 609 753b338-753b38e 612 753b390-753b39c 609->612 613 753b39e-753b3dd WriteProcessMemory 609->613 612->613 615 753b3e6-753b416 613->615 616 753b3df-753b3e5 613->616 616->615
                            APIs
                            • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0753B3D0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: eb13ef0b4101d86a33ce5757d86a0b3c6089308546d836a875362d0cac03eea3
                            • Instruction ID: 6ca894b090f813b9fca4a85964901d72a615384bc5136018d233909942914f5a
                            • Opcode Fuzzy Hash: eb13ef0b4101d86a33ce5757d86a0b3c6089308546d836a875362d0cac03eea3
                            • Instruction Fuzzy Hash: C5212CB59003199FCB10DFA9C885BEEBBF5FF48320F10842AE519A7650C7789554DBA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 620 753b340-753b38e 622 753b390-753b39c 620->622 623 753b39e-753b3dd WriteProcessMemory 620->623 622->623 625 753b3e6-753b416 623->625 626 753b3df-753b3e5 623->626 626->625
                            APIs
                            • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0753B3D0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: 6842b3f50f91c7906fd200f19a4fe2782768633de632c62c759856ec55ab5789
                            • Instruction ID: da5fed144e9445884c34f5f2aa5900dccb4f1503803109025f3bade6fcb39e7e
                            • Opcode Fuzzy Hash: 6842b3f50f91c7906fd200f19a4fe2782768633de632c62c759856ec55ab5789
                            • Instruction Fuzzy Hash: FA2105B59003599FCB10DFAAC885BEEBBF5FF48314F10842AE919A7250C7789954CBA4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 630 753b1a1-753b1f3 632 753b203-753b233 Wow64SetThreadContext 630->632 633 753b1f5-753b201 630->633 635 753b235-753b23b 632->635 636 753b23c-753b26c 632->636 633->632 635->636
                            APIs
                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0753B226
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: ContextThreadWow64
                            • String ID:
                            • API String ID: 983334009-0
                            • Opcode ID: 15b46c085cf6602d3a7d7d3c9b897440429a7bafde2224dbf6426f17849f3a2a
                            • Instruction ID: d2699d946fdc9b81c947d5e0d52301c7b3e3c722f34f67c6acea24f4c5fa6c32
                            • Opcode Fuzzy Hash: 15b46c085cf6602d3a7d7d3c9b897440429a7bafde2224dbf6426f17849f3a2a
                            • Instruction Fuzzy Hash: B02114B19002098EDB10DFAAC485BEEBBF4BF88324F14842AD459A7250CB789945CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 640 753b828-753b8bd ReadProcessMemory 644 753b8c6-753b8f6 640->644 645 753b8bf-753b8c5 640->645 645->644
                            APIs
                            • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0753B8B0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: 4514c506d6774e91d1795b32aff10cf9e3c27016e88af5d105999ce013b96302
                            • Instruction ID: a4f6e36d78397f3937a6dff3bc61521137e019acfa68ce85810ac94393b1620d
                            • Opcode Fuzzy Hash: 4514c506d6774e91d1795b32aff10cf9e3c27016e88af5d105999ce013b96302
                            • Instruction Fuzzy Hash: DB2114B5C002499FDB10DFAAC881AEEFBF5FF48320F10842AE519A7250C7789945DFA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 649 753b1a8-753b1f3 651 753b203-753b233 Wow64SetThreadContext 649->651 652 753b1f5-753b201 649->652 654 753b235-753b23b 651->654 655 753b23c-753b26c 651->655 652->651 654->655
                            APIs
                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0753B226
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: ContextThreadWow64
                            • String ID:
                            • API String ID: 983334009-0
                            • Opcode ID: 93ae72744118c6760fbdaa1d8b41519d74433e83c0e4904ad38e4179acb2ef7f
                            • Instruction ID: 83637d9beb0c085e9c67e8481b1028c4446ef36bf23f90074c2b3acc669a58c6
                            • Opcode Fuzzy Hash: 93ae72744118c6760fbdaa1d8b41519d74433e83c0e4904ad38e4179acb2ef7f
                            • Instruction Fuzzy Hash: F42104B1D002098FDB10DFAAC485BEEBBF4FF88314F14842AD519A7251CB78A945CFA5
                            APIs
                            • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0753B8B0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: 55135314e6e63c618c488baa58080dae27ac1ea206757280a2577c81d54ae750
                            • Instruction ID: 6e616b1f911472dfd21ee87267b27944f7de02fd169b71d001dacef145289053
                            • Opcode Fuzzy Hash: 55135314e6e63c618c488baa58080dae27ac1ea206757280a2577c81d54ae750
                            • Instruction Fuzzy Hash: 792125B1C002499FDB10DFAAC880AEEFBF5FF48310F10842AE519A7250C7389941CBA0
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016AD747
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: e85622999eaef88f604263c81a8415ae499a2683d753a971f66698592984e440
                            • Instruction ID: 05878bf9eff8d0a40c281382b30e1947b258cf7bf60e6d67ce305a29c80d1f96
                            • Opcode Fuzzy Hash: e85622999eaef88f604263c81a8415ae499a2683d753a971f66698592984e440
                            • Instruction Fuzzy Hash: D521C6B59002489FDB10CF9AD984ADEBFF5FB48310F14841AE914A3350D378A954CFA5
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016AD747
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 4e4cd5bfa90a944a527d884cda472ec67a132a7980a0b765c4eca413330e2e5c
                            • Instruction ID: 2df9d100767b1d2ebdd4f7418b052ae924ac4e2ab831dfcf59afd93fe46bd97f
                            • Opcode Fuzzy Hash: 4e4cd5bfa90a944a527d884cda472ec67a132a7980a0b765c4eca413330e2e5c
                            • Instruction Fuzzy Hash: BD21B3B59002499FDB10CFAAD984AEEBBF9EB48314F14841AE918B3350D378A954CF65
                            APIs
                            • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0753B2EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: df8fd461504764fe2b33302448ee8fb55f232e2552d4e6e97c21334949edee10
                            • Instruction ID: 965e3b44aea87000035151f082fc924c8ecaa09dd0af4d48b0aeba55b76ab228
                            • Opcode Fuzzy Hash: df8fd461504764fe2b33302448ee8fb55f232e2552d4e6e97c21334949edee10
                            • Instruction Fuzzy Hash: 7E1159B69002498FCB10DFA9C844AEEFFF5FF88324F24841AE519A7250C7399544CFA0
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 87c212ebf02ae5e53c006fc06b26908c9c15cf7513bef3cdfe1d4d53e3b401df
                            • Instruction ID: 9b8aa25397c3e2d1a917d7ccf98ffe694f5eba5a5cad89a5270ef6a5df6a05e4
                            • Opcode Fuzzy Hash: 87c212ebf02ae5e53c006fc06b26908c9c15cf7513bef3cdfe1d4d53e3b401df
                            • Instruction Fuzzy Hash: E51149B59002088ACB20DFAAC4457EEFBF5FF89324F24841AD519A7250CB78A544CFE5
                            APIs
                            • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0753B2EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 57b1c04073359574f125840c7917019dc574a2406eeeafc66c7765417b78a74a
                            • Instruction ID: 69c0e4aa489f21b664ed585bd182745a3b11e39ced68410636c7d638ae5e595f
                            • Opcode Fuzzy Hash: 57b1c04073359574f125840c7917019dc574a2406eeeafc66c7765417b78a74a
                            • Instruction Fuzzy Hash: 2A1137B59002499FCB10DFAAC844AEFBFF5FF88324F108419E519A7250C779A940CFA0
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 500165ff2cb06545253f43036fc9178a6ca078f244e7ad9806ec421b23a177ed
                            • Instruction ID: 3d6e2ad8738271e260ebdca5cc1d6253e48f8ebc7afd77f999e0a896e813de92
                            • Opcode Fuzzy Hash: 500165ff2cb06545253f43036fc9178a6ca078f244e7ad9806ec421b23a177ed
                            • Instruction Fuzzy Hash: 7B1125B19002498BCB20DFAAC4457EEFBF5EF88324F20841AD519A7250CB79A944CFA4
                            APIs
                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 0753FE65
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: MessagePost
                            • String ID:
                            • API String ID: 410705778-0
                            • Opcode ID: 8b17774031f30ff73d7e8e4b097e58d325ef7723cb9e8ebfc738b2aaa8ac1d1f
                            • Instruction ID: 9bc0f65fcb472508e7381bf8b936c7f553ac4e0aaeea9a8036f7a8293cfb0995
                            • Opcode Fuzzy Hash: 8b17774031f30ff73d7e8e4b097e58d325ef7723cb9e8ebfc738b2aaa8ac1d1f
                            • Instruction Fuzzy Hash: 9611F5B58002499FCB10DF99D585BDEFFF8FB48320F20841AE518A3650C375A944CFA1
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 016AB03E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 11ec0a40eabd311bffffb41f943c58fb96fae1f05b2272827ca7d95dd78f1cae
                            • Instruction ID: fbd07d2aa23b12a02036d97e181ecf786d9eca3d5fe06d2fda44b0dab652ce63
                            • Opcode Fuzzy Hash: 11ec0a40eabd311bffffb41f943c58fb96fae1f05b2272827ca7d95dd78f1cae
                            • Instruction Fuzzy Hash: B8110FB6C002498FDB10DF9AC844ADEFBF4AF88214F10841AD529A7210D379A945CFA5
                            APIs
                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 0753FE65
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID: MessagePost
                            • String ID:
                            • API String ID: 410705778-0
                            • Opcode ID: 2b2717269db092b647ea705db4083555f6e5104d7b818c2fcec9cdfbb2630c0b
                            • Instruction ID: 3abe65650482d1b243642970da0d222b78e6d91dd3a4b1be3521b6b4a4c5a60b
                            • Opcode Fuzzy Hash: 2b2717269db092b647ea705db4083555f6e5104d7b818c2fcec9cdfbb2630c0b
                            • Instruction Fuzzy Hash: 3B1103B58003499FCB50DF9AC584BDEBBF8FB48310F10841AE518A7251C379A944CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2188709965.000000000AF10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AF10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_af10000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e342b200eee471140eed47087f9bd8ed5f2d815ce3239a21cccf6b9ae6651ba2
                            • Instruction ID: 3d75f4ad69f4a45e1f06e7805a5903e8b0dfa99fe5a4b3bf21e082f7cca64efe
                            • Opcode Fuzzy Hash: e342b200eee471140eed47087f9bd8ed5f2d815ce3239a21cccf6b9ae6651ba2
                            • Instruction Fuzzy Hash: 07B15B34B012089FDB14DBA8D594AAEBBF6EF89710F2540A9E405AB3A5CF30DD41CF90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2180533865.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_121d000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 663d78bba339b334082dcd9f9ee2bc81299aebe31a32f511626f11f75a63f560
                            • Instruction ID: 61d9f4731992502f4a12119329c4d951f7bfb382e271f1f70dced5e1abd06caf
                            • Opcode Fuzzy Hash: 663d78bba339b334082dcd9f9ee2bc81299aebe31a32f511626f11f75a63f560
                            • Instruction Fuzzy Hash: D5216A75150208DFDB05DF98D9C8F56BFA5FBA8314F20C56DE9090B25AC33AE406CBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2180682731.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_122d000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6c969f6e08070dd3a99af77bd4f0c611828ba4ebe9530d8efe431e7912384455
                            • Instruction ID: 1fbcb55f972d964806975545fd8e7dd1a5af3e34edb5e0b4436fdeb3f3004711
                            • Opcode Fuzzy Hash: 6c969f6e08070dd3a99af77bd4f0c611828ba4ebe9530d8efe431e7912384455
                            • Instruction Fuzzy Hash: 26210771554208EFDB05DFA8D5C0F2ABB65FB85324F20C66DD9094B257C37AD406CA61
                            Memory Dump Source
                            • Source File: 00000000.00000002.2180682731.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_122d000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9b8f7b3319e671f2118b59ae05599b2978653659e109bfbe1e48868b77006323
                            • Instruction ID: f65900ffa012ead2c44519086f68444c54cf2b84a13b55f56d530c304e95b16f
                            • Opcode Fuzzy Hash: 9b8f7b3319e671f2118b59ae05599b2978653659e109bfbe1e48868b77006323
                            • Instruction Fuzzy Hash: 8A212571514248EFCB15DF68D580B1ABF65FB84314F20C56DD9090B266C37ED507CA61
                            Memory Dump Source
                            • Source File: 00000000.00000002.2188709965.000000000AF10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AF10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_af10000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 310977663d7e3a5e74511803c266d2fe33157b7128a307e267c680621694b3c7
                            • Instruction ID: c8d62fe123d96ad88490192c1e625f3d498e4d1a8378b5aa5986c9645182e9fd
                            • Opcode Fuzzy Hash: 310977663d7e3a5e74511803c266d2fe33157b7128a307e267c680621694b3c7
                            • Instruction Fuzzy Hash: 1D11E172A04311CBC3248B19D8846B9B7B1FB46322F144973E419CB282CF39EDC5DB60
                            Memory Dump Source
                            • Source File: 00000000.00000002.2180682731.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_122d000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 634656832cced321f66d54f91227026c972f8a55d6c1da0ead7620cc0e8bb7e8
                            • Instruction ID: 148fea84590cec5db3c01f46ce93b52a48ad4538cf0bd90b006d8bbb01f5e6c1
                            • Opcode Fuzzy Hash: 634656832cced321f66d54f91227026c972f8a55d6c1da0ead7620cc0e8bb7e8
                            • Instruction Fuzzy Hash: E32180755083849FCB03CF64D994715BF71EB46314F28C5DAD9898F2A7C33A981ACB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.2180533865.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_121d000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                            • Instruction ID: 9e8c04c87d49da9fb873933c8bd3f1dcbf53249f7d060ec0c84ce0737bcee5ae
                            • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                            • Instruction Fuzzy Hash: AB112976444244CFDB16CF44D5C4B56BFB1FB94314F24C6A9D9090B25BC33AD456CBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2180682731.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_122d000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                            • Instruction ID: b8636e0d6287ee6214e92f548c40f995ba4fe92134ec6d22b34fb4ca9f019471
                            • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                            • Instruction Fuzzy Hash: 5C11BB75504284EFDB02CF54C5C4B19BFA1FB85224F24C6A9D9494B297C33AD40ACB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.2188709965.000000000AF10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AF10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_af10000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0180b2e507eed10bd0c3175e92b2abc6f9ce66b5ad3e9fe873498fe7b722a6bf
                            • Instruction ID: 3a02b4964415a744c444c31ff58feccda1edae9d8571b4a031189ae1d74e764d
                            • Opcode Fuzzy Hash: 0180b2e507eed10bd0c3175e92b2abc6f9ce66b5ad3e9fe873498fe7b722a6bf
                            • Instruction Fuzzy Hash: 0701C071740A448FC319DB7DD988AA6BBE6BFC862071984BAD149CF326CA34D805CB10
                            Memory Dump Source
                            • Source File: 00000000.00000002.2188709965.000000000AF10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AF10000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_af10000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2e45df15d519a467cbbaac8b80bf3c4c3c4a291359ca0c1136383db731b192ea
                            • Instruction ID: d5d624a99a9002ae9f4d31b86576f1f754e6ed3de09acaf4c89654f8549aad34
                            • Opcode Fuzzy Hash: 2e45df15d519a467cbbaac8b80bf3c4c3c4a291359ca0c1136383db731b192ea
                            • Instruction Fuzzy Hash: 98012C71710A448FC728DF6AD888A66BBE6FFC8620B1984B9D11ACB765CA34D8058B40
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID: R{
                            • API String ID: 0-3687504879
                            • Opcode ID: 34441dd1018fed1331eda0b9788fdb5dd6d9784a4a9d5d3973ee8b1748f0dbff
                            • Instruction ID: a109a7506fee8697ee1d3f56075f8d9f67bbbd10941b1436f4564ea08985dec7
                            • Opcode Fuzzy Hash: 34441dd1018fed1331eda0b9788fdb5dd6d9784a4a9d5d3973ee8b1748f0dbff
                            • Instruction Fuzzy Hash: 56E1E8B4E001198FDB14CFA9C5809AEFBB2FF89305F24C16AE455A7356D735A942CFA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e9037dbe5f63d010d3d993d64064e7048f2e92e591e1c0bcb49216187e205461
                            • Instruction ID: 0d5d391763f2755a50182410889de0d74567a283609ecc985e6657e2e27d3276
                            • Opcode Fuzzy Hash: e9037dbe5f63d010d3d993d64064e7048f2e92e591e1c0bcb49216187e205461
                            • Instruction Fuzzy Hash: 52E109B4E001198FCB14CFA9C5809AEFBB2FF89305F24816AD415AB396D775AD41CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4e0353b765caa819d550a1503fdbf3b060d8b074d7f7680d4524023a875af9a5
                            • Instruction ID: 207ccf4c2968611dd0876c60102520ae82f46f56505984e89ee54b0601b7de62
                            • Opcode Fuzzy Hash: 4e0353b765caa819d550a1503fdbf3b060d8b074d7f7680d4524023a875af9a5
                            • Instruction Fuzzy Hash: 1AE1EBB4E001198FCB14DFA9C5809AEFBB2FF89305F24816AE415AB356D735AD41CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0696e6f597185f785dbbf56b7e7c0bd3071cf229e0a1c7e430c29b6f168dfc87
                            • Instruction ID: ec8247d6cd6d1334652defe41fa72b9e11d4e03b08d482926bfd267597da015f
                            • Opcode Fuzzy Hash: 0696e6f597185f785dbbf56b7e7c0bd3071cf229e0a1c7e430c29b6f168dfc87
                            • Instruction Fuzzy Hash: 94E1DCB4E001198FCB15CFA9C5809AEFBB2FF89305F24816AE415AB355D735AD41CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2186609387.0000000007530000.00000040.00000800.00020000.00000000.sdmp, Offset: 07530000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7530000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7660f99a6299a621a920d72b17f52ec190f1139ba36f8b955a73463ae055dcf7
                            • Instruction ID: 50eb856479dab5f4ce5ea6e4faa1579942eb73a74d31f6f7762a4934355f41b9
                            • Opcode Fuzzy Hash: 7660f99a6299a621a920d72b17f52ec190f1139ba36f8b955a73463ae055dcf7
                            • Instruction Fuzzy Hash: 18E1D6B4E001198FCB14CFA9C5809AEBBB2FF89305F24C16AE455AB356D735AD41CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2181828458.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_16a0000_uShK30bvrV.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cd393fc0a15af52bfd6510a39be5b710e92451e3287789938a62106c3b443d67
                            • Instruction ID: c5c8e6f405e8fffa3bdcd9181d0dea1ddfff56f56dcb1af8a57ef27f3a148bca
                            • Opcode Fuzzy Hash: cd393fc0a15af52bfd6510a39be5b710e92451e3287789938a62106c3b443d67
                            • Instruction Fuzzy Hash: D9A16D36E002198FCF15DFB4C8905AEBBB2FF85300B5585AAE901AB265DB71ED16CF41

                            Execution Graph

                            Execution Coverage:7.3%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:39
                            Total number of Limit Nodes:5
                            execution_graph 15753 d9d478 15754 d9d4be GetCurrentProcess 15753->15754 15756 d9d509 15754->15756 15757 d9d510 GetCurrentThread 15754->15757 15756->15757 15758 d9d54d GetCurrentProcess 15757->15758 15759 d9d546 15757->15759 15760 d9d583 15758->15760 15759->15758 15761 d9d5ab GetCurrentThreadId 15760->15761 15762 d9d5dc 15761->15762 15763 d94668 15764 d9467a 15763->15764 15765 d94686 15764->15765 15767 d94778 15764->15767 15768 d9477c 15767->15768 15772 d94888 15768->15772 15776 d94878 15768->15776 15774 d948af 15772->15774 15773 d9498c 15773->15773 15774->15773 15780 d944b4 15774->15780 15778 d9487c 15776->15778 15777 d9498c 15777->15777 15778->15777 15779 d944b4 CreateActCtxA 15778->15779 15779->15777 15781 d95918 CreateActCtxA 15780->15781 15783 d959db 15781->15783 15783->15783 15784 d9d6c0 DuplicateHandle 15785 d9d756 15784->15785 15786 d9acf0 15787 d9acf2 15786->15787 15791 d9add8 15787->15791 15796 d9ade8 15787->15796 15788 d9acff 15793 d9addc 15791->15793 15792 d9ae1c 15792->15788 15793->15792 15794 d9b020 GetModuleHandleW 15793->15794 15795 d9b04d 15794->15795 15795->15788 15798 d9adea 15796->15798 15797 d9ae1c 15797->15788 15798->15797 15799 d9b020 GetModuleHandleW 15798->15799 15800 d9b04d 15799->15800 15800->15788

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 318 d9d478-d9d507 GetCurrentProcess 322 d9d509-d9d50f 318->322 323 d9d510-d9d544 GetCurrentThread 318->323 322->323 324 d9d54d-d9d581 GetCurrentProcess 323->324 325 d9d546-d9d54c 323->325 327 d9d58a-d9d5a5 call d9d647 324->327 328 d9d583-d9d589 324->328 325->324 331 d9d5ab-d9d5da GetCurrentThreadId 327->331 328->327 332 d9d5dc-d9d5e2 331->332 333 d9d5e3-d9d645 331->333 332->333
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 00D9D4F6
                            • GetCurrentThread.KERNEL32 ref: 00D9D533
                            • GetCurrentProcess.KERNEL32 ref: 00D9D570
                            • GetCurrentThreadId.KERNEL32 ref: 00D9D5C9
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 8f46ea17e132fd0ad251f19a0c286f8ff3d7965ede60bb6dd3815ccfb2d2e01f
                            • Instruction ID: 89a3ca9d6e1d96b0adab80bd459e9f306e9cf0468a8ed4b28cc417fc1cf587c2
                            • Opcode Fuzzy Hash: 8f46ea17e132fd0ad251f19a0c286f8ff3d7965ede60bb6dd3815ccfb2d2e01f
                            • Instruction Fuzzy Hash: 345158B09002098FDB54DFAAD548BAEBBF2FF49304F20C459D409A7360D7789944CF66

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 296 d9d468-d9d507 GetCurrentProcess 300 d9d509-d9d50f 296->300 301 d9d510-d9d544 GetCurrentThread 296->301 300->301 302 d9d54d-d9d581 GetCurrentProcess 301->302 303 d9d546-d9d54c 301->303 305 d9d58a-d9d5a5 call d9d647 302->305 306 d9d583-d9d589 302->306 303->302 309 d9d5ab-d9d5da GetCurrentThreadId 305->309 306->305 310 d9d5dc-d9d5e2 309->310 311 d9d5e3-d9d645 309->311 310->311
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 00D9D4F6
                            • GetCurrentThread.KERNEL32 ref: 00D9D533
                            • GetCurrentProcess.KERNEL32 ref: 00D9D570
                            • GetCurrentThreadId.KERNEL32 ref: 00D9D5C9
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: aef2948c5f8dae264894324e4a4f2af4a9964cb7e77c3fe99392fd8d2c4ea211
                            • Instruction ID: 24d81b57138ae38f9583cc4a48b7210ac07dc533aa10b47c1485f91a9027a3b7
                            • Opcode Fuzzy Hash: aef2948c5f8dae264894324e4a4f2af4a9964cb7e77c3fe99392fd8d2c4ea211
                            • Instruction Fuzzy Hash: 815145B0900249CFDB44DFA9D548BAEBBF2FF49304F248459D409A73A1D7789984CF66

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 384 d9ade8-d9adf7 386 d9adf9-d9ae06 call d99414 384->386 387 d9ae23-d9ae27 384->387 392 d9ae08 386->392 393 d9ae1c 386->393 389 d9ae29-d9ae33 387->389 390 d9ae3b-d9ae7c 387->390 389->390 396 d9ae89-d9ae97 390->396 397 d9ae7e-d9ae86 390->397 440 d9ae0e call d9b080 392->440 441 d9ae0e call d9b070 392->441 393->387 398 d9ae99-d9ae9e 396->398 399 d9aebb-d9aebd 396->399 397->396 401 d9aea9 398->401 402 d9aea0-d9aea7 call d9a150 398->402 404 d9aec0-d9aec7 399->404 400 d9ae14-d9ae16 400->393 403 d9af58-d9b018 400->403 408 d9aeab-d9aeb9 401->408 402->408 435 d9b01a-d9b01d 403->435 436 d9b020-d9b04b GetModuleHandleW 403->436 406 d9aec9-d9aed1 404->406 407 d9aed4-d9aedb 404->407 406->407 411 d9aee8-d9aef1 call d9a160 407->411 412 d9aedd-d9aee5 407->412 408->404 416 d9aefe-d9af03 411->416 417 d9aef3-d9aefb 411->417 412->411 419 d9af21-d9af2e 416->419 420 d9af05-d9af0c 416->420 417->416 426 d9af51-d9af57 419->426 427 d9af30-d9af4e 419->427 420->419 421 d9af0e-d9af1e call d9a170 call d9a180 420->421 421->419 427->426 435->436 437 d9b04d-d9b053 436->437 438 d9b054-d9b068 436->438 437->438 440->400 441->400
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00D9B03E
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 25f152d317f41a0999b3d56bdacdfddd34df53c9bc99cc27f6e2eca5b257db95
                            • Instruction ID: c2f11a93eaae7d2fda7cf065f14e5ced62ed1620fcb02b40233b0ce832de4b2f
                            • Opcode Fuzzy Hash: 25f152d317f41a0999b3d56bdacdfddd34df53c9bc99cc27f6e2eca5b257db95
                            • Instruction Fuzzy Hash: 61714771A00B058FDB24DF69D04575ABBF1FF88300F04892DE48AD7A50D775E949CBA6

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 442 d9590c-d95912 443 d95914 442->443 444 d95916-d9598c 442->444 443->444 446 d9598f-d959d9 CreateActCtxA 444->446 448 d959db-d959e1 446->448 449 d959e2-d95a3c 446->449 448->449 456 d95a4b-d95a4f 449->456 457 d95a3e-d95a41 449->457 458 d95a51-d95a5d 456->458 459 d95a60 456->459 457->456 458->459 461 d95a61 459->461 461->461
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 00D959C9
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: bdd8e3b155d3be04c5a4531f1a675c47ab3551967685da7178cde145951cb7a3
                            • Instruction ID: 73ad313d2cefa4d17df75e638c0f0df70db2dcf97018f90e6074bfcc01d1ae6d
                            • Opcode Fuzzy Hash: bdd8e3b155d3be04c5a4531f1a675c47ab3551967685da7178cde145951cb7a3
                            • Instruction Fuzzy Hash: 834144B0C00719CEDF25DFAAC884BDDBBB5BF49304F20816AD409AB254DB716946CFA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 462 d95a84-d95b14
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ade9012550c06eef0d20067fbd40fad1b9e26c1e09415915e52fc4f3f34b61b8
                            • Instruction ID: faef170f2a7fa920da0e837abf98939f89cb1d6d15a8b91125e3e83dbbbefbf9
                            • Opcode Fuzzy Hash: ade9012550c06eef0d20067fbd40fad1b9e26c1e09415915e52fc4f3f34b61b8
                            • Instruction Fuzzy Hash: 53310571805A49DFDF12DFA8D8447ADBBF0FF42314F2482AAC0059B259C775694ACF21

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 465 d944b4-d959d9 CreateActCtxA 469 d959db-d959e1 465->469 470 d959e2-d95a3c 465->470 469->470 477 d95a4b-d95a4f 470->477 478 d95a3e-d95a41 470->478 479 d95a51-d95a5d 477->479 480 d95a60 477->480 478->477 479->480 482 d95a61 480->482 482->482
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 00D959C9
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 3981916bbd3ad93d32eb08422b7c2f73c0e7a1481470c383f5d33450bdf975c8
                            • Instruction ID: f5c4f6df84b5e6d22072916696f335f50ef5b799b67bfff444dd3d0f7f20ea39
                            • Opcode Fuzzy Hash: 3981916bbd3ad93d32eb08422b7c2f73c0e7a1481470c383f5d33450bdf975c8
                            • Instruction Fuzzy Hash: 9B41F3B0C0071DCBDF25DFAAC844B9EBBB5BF48304F20816AD409AB255DB756945CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 483 d9d6c0-d9d754 DuplicateHandle 484 d9d75d-d9d77a 483->484 485 d9d756-d9d75c 483->485 485->484
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D9D747
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 0eeb21cb831de736478c796aa7f10938d54627d2c0b86df53cb9b1d9de4c1cbb
                            • Instruction ID: 7e94c130a2cb84442e803c03dc84a9bd80a20c8d31a550086acb0993e913b122
                            • Opcode Fuzzy Hash: 0eeb21cb831de736478c796aa7f10938d54627d2c0b86df53cb9b1d9de4c1cbb
                            • Instruction Fuzzy Hash: 2521D5B59002499FDB10CF9AD584ADEFFF9FB48310F14841AE919A3350D378A944CFA5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 488 d9d6b9-d9d754 DuplicateHandle 489 d9d75d-d9d77a 488->489 490 d9d756-d9d75c 488->490 490->489
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D9D747
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 3d8ba7d2d6d42e8fd0c9b03f30e6a9d13e84014c95b7ef2976d7d05615ec4884
                            • Instruction ID: c4ad9e4f0883267e2844ba58081eef9c079d221f433583792dda69a3a7ffba7c
                            • Opcode Fuzzy Hash: 3d8ba7d2d6d42e8fd0c9b03f30e6a9d13e84014c95b7ef2976d7d05615ec4884
                            • Instruction Fuzzy Hash: CE21F3B5900249DFDB10CFAAD584AEEBBF5FB48310F14801AE919B3350C378AA40CF61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 493 d9afd8-d9b018 494 d9b01a-d9b01d 493->494 495 d9b020-d9b04b GetModuleHandleW 493->495 494->495 496 d9b04d-d9b053 495->496 497 d9b054-d9b068 495->497 496->497
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00D9B03E
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2283403034.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_d90000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: c948f315574b160bd115605f87c4d2fd51772452658ee0c16a7dd5c2f586e3e0
                            • Instruction ID: 2cf8d5fe3280b6f4cab82b0af3fe386e02da830fe1ead781b06a052f2477fef1
                            • Opcode Fuzzy Hash: c948f315574b160bd115605f87c4d2fd51772452658ee0c16a7dd5c2f586e3e0
                            • Instruction Fuzzy Hash: 5B110FB5C002498FCB10CF9AD544ADEFBF4AB89320F14841AD529A7210D379A545CFA1
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2282525722.00000000008DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_8dd000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 63b49fef12c83300bd08b96f329abae837fc78dfaf647df68d1d3e66a9ecbd01
                            • Instruction ID: 69a161e531b36de5ec1587b8f1cd7e194c23fe037cbe0eea5a5dc0845fa12a4c
                            • Opcode Fuzzy Hash: 63b49fef12c83300bd08b96f329abae837fc78dfaf647df68d1d3e66a9ecbd01
                            • Instruction Fuzzy Hash: 0A210671500304DFDB15DF14D9C0F26BF66FB98324F20C66AD9098B356C33AE856D6A2
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2282589691.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_8ed000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1df0603f659407cf9e25a862d8c9091256b81fdfa6889c287ef2288f1e6c9472
                            • Instruction ID: 40c32e99cf710cbe9766d6a36896a13769c664a48cbae81cc4eeda1ea34c6a87
                            • Opcode Fuzzy Hash: 1df0603f659407cf9e25a862d8c9091256b81fdfa6889c287ef2288f1e6c9472
                            • Instruction Fuzzy Hash: F121F271604784DFCB14DF25D984B26BF65FB89314F28C569D90A8B396C33AD80BCA61
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2282589691.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_8ed000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4ad38b626a14d254ec6471787d6ba2aaeb5e98ad295551792ababcf690a8adec
                            • Instruction ID: 1976aa5c80cae1fcfdda87ff5ac3ea91bc2054fb47c184518006e84eb2eb9cdd
                            • Opcode Fuzzy Hash: 4ad38b626a14d254ec6471787d6ba2aaeb5e98ad295551792ababcf690a8adec
                            • Instruction Fuzzy Hash: 80210775504384DFDB05DF25D5C0F26BB65FB85314F20C56DDA098B396C33AE80ADA61
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2282589691.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_8ed000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c9efac9c6e879d9df2f3f358a439aceb29c8ca35e978e9619f219bb10a74166b
                            • Instruction ID: 4a8d9930c735434b2a3d0eca63016ef08f3e16758bbf2cdd6bc3138f4a809f47
                            • Opcode Fuzzy Hash: c9efac9c6e879d9df2f3f358a439aceb29c8ca35e978e9619f219bb10a74166b
                            • Instruction Fuzzy Hash: C9214F755087809FCB02CF14D994711BF71FB46314F28C5EAD8498B2A7C33A985ACB62
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2282525722.00000000008DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_8dd000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                            • Instruction ID: 22cb541a5781f47b6e29c8f1955763a85258b90088ff8ea453e90fb15b318512
                            • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                            • Instruction Fuzzy Hash: E011DF72404340DFCB12CF00D5C4B16BF72FB94324F24C6AAD9094B256C33AE85ACBA2
                            Memory Dump Source
                            • Source File: 0000000B.00000002.2282589691.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_11_2_8ed000_LwGrjoPJzyBSZs.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                            • Instruction ID: c0d69ca982c90a088530a709d392f1e656e30ce16c0f50c253ea6991f167270a
                            • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                            • Instruction Fuzzy Hash: 3B11BB75504380DFCB02CF10C5C4B15BBA2FB85314F24C6A9D9498B296C33AE80ACB62

                            Execution Graph

                            Execution Coverage:0.6%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:4.5%
                            Total number of Nodes:418
                            Total number of Limit Nodes:20
                            execution_graph 47186 4047eb WaitForSingleObject 47187 404805 SetEvent CloseHandle 47186->47187 47188 40481c closesocket 47186->47188 47189 40489c 47187->47189 47190 404829 47188->47190 47191 40483f 47190->47191 47199 404ab1 83 API calls 47190->47199 47192 404851 WaitForSingleObject 47191->47192 47193 404892 SetEvent CloseHandle 47191->47193 47200 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47192->47200 47193->47189 47196 404860 SetEvent WaitForSingleObject 47201 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47196->47201 47198 404878 SetEvent CloseHandle CloseHandle 47198->47193 47199->47191 47200->47196 47201->47198 47202 402bcc 47203 402bd7 47202->47203 47204 402bdf 47202->47204 47220 403315 28 API calls _Deallocate 47203->47220 47206 402beb 47204->47206 47210 4015d3 47204->47210 47207 402bdd 47212 43360d 47210->47212 47213 402be9 47212->47213 47216 43362e std::_Facet_Register 47212->47216 47221 43a88c 47212->47221 47228 442200 7 API calls 2 library calls 47212->47228 47215 433dec std::_Facet_Register 47230 437bd7 RaiseException 47215->47230 47216->47215 47229 437bd7 RaiseException 47216->47229 47218 433e09 47220->47207 47226 446aff _strftime 47221->47226 47222 446b3d 47232 445354 20 API calls _free 47222->47232 47224 446b28 RtlAllocateHeap 47225 446b3b 47224->47225 47224->47226 47225->47212 47226->47222 47226->47224 47231 442200 7 API calls 2 library calls 47226->47231 47228->47212 47229->47215 47230->47218 47231->47226 47232->47225 47233 4339be 47234 4339ca ___BuildCatchObject 47233->47234 47265 4336b3 47234->47265 47236 4339d1 47237 433b24 47236->47237 47241 4339fb 47236->47241 47561 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47237->47561 47239 433b2b 47552 4426be 47239->47552 47252 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47241->47252 47555 4434d1 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47241->47555 47245 433a14 47247 433a1a 47245->47247 47556 443475 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47245->47556 47249 433a9b 47276 433c5e 47249->47276 47252->47249 47557 43edf4 35 API calls 3 library calls 47252->47557 47259 433abd 47259->47239 47260 433ac1 47259->47260 47261 433aca 47260->47261 47559 442661 28 API calls _abort 47260->47559 47560 433842 13 API calls 2 library calls 47261->47560 47264 433ad2 47264->47247 47266 4336bc 47265->47266 47563 433e0a IsProcessorFeaturePresent 47266->47563 47268 4336c8 47564 4379ee 10 API calls 3 library calls 47268->47564 47270 4336cd 47275 4336d1 47270->47275 47565 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47270->47565 47272 4336da 47273 4336e8 47272->47273 47566 437a17 8 API calls 3 library calls 47272->47566 47273->47236 47275->47236 47567 436050 47276->47567 47278 433c71 GetStartupInfoW 47279 433aa1 47278->47279 47280 443422 47279->47280 47568 44ddc9 47280->47568 47282 44342b 47283 433aaa 47282->47283 47572 44e0d3 35 API calls 47282->47572 47285 40d767 47283->47285 47574 41bce3 LoadLibraryA GetProcAddress 47285->47574 47287 40d783 GetModuleFileNameW 47579 40e168 32 API calls 2 library calls 47287->47579 47289 40d79f 47580 401fbd 28 API calls 47289->47580 47291 40d7ae 47581 401fbd 28 API calls 47291->47581 47293 40d7bd 47582 41afc3 28 API calls 47293->47582 47295 40d7c6 47583 40e8bd 11 API calls 47295->47583 47297 40d7cf 47584 401d8c 11 API calls 47297->47584 47299 40d7d8 47300 40d835 47299->47300 47301 40d7eb 47299->47301 47585 401d64 22 API calls 47300->47585 47600 40e986 111 API calls 47301->47600 47304 40d7fd 47601 401d64 22 API calls 47304->47601 47305 40d845 47586 401d64 22 API calls 47305->47586 47308 40d864 47587 404cbf 28 API calls 47308->47587 47310 40d809 47602 40e937 65 API calls 47310->47602 47311 40d873 47588 405ce6 28 API calls 47311->47588 47314 40d87f 47589 401eef 11 API calls 47314->47589 47315 40d824 47603 40e155 65 API calls 47315->47603 47318 40d88b 47590 401eea 11 API calls 47318->47590 47319 40d82d 47643 401eea 11 API calls 47319->47643 47321 40d894 47591 401eea 11 API calls 47321->47591 47324 40dc9f 47558 433c94 GetModuleHandleW 47324->47558 47325 40d89d 47592 401d64 22 API calls 47325->47592 47327 40d8a6 47593 401ebd 28 API calls 47327->47593 47329 40d8b1 47594 401d64 22 API calls 47329->47594 47331 40d8ca 47595 401d64 22 API calls 47331->47595 47333 40d8e5 47346 40d946 47333->47346 47604 4085b4 28 API calls 47333->47604 47336 40d912 47605 401eef 11 API calls 47336->47605 47338 40d91e 47606 401eea 11 API calls 47338->47606 47341 40d9aa 47341->47319 47610 41a463 33 API calls 47341->47610 47342 40d95d 47353 40d9a4 47342->47353 47608 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 47342->47608 47343 40d927 47607 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 47343->47607 47348 40e134 47346->47348 47596 401d64 22 API calls 47346->47596 47698 412902 30 API calls 47348->47698 47349 40d9c5 47352 40da18 47349->47352 47611 40697b RegOpenKeyExA RegQueryValueExA RegCloseKey 47349->47611 47350 40d988 47350->47353 47609 412902 30 API calls 47350->47609 47616 401d64 22 API calls 47352->47616 47597 40bed7 47353->47597 47357 40da21 47366 40da32 47357->47366 47367 40da2d 47357->47367 47358 40d9e0 47360 40d9e4 47358->47360 47361 40d9ee 47358->47361 47359 40e14a 47699 4112b5 64 API calls ___scrt_fastfail 47359->47699 47612 40699d 30 API calls 47360->47612 47614 401d64 22 API calls 47361->47614 47618 401d64 22 API calls 47366->47618 47617 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47367->47617 47368 40d9e9 47613 4064d0 97 API calls 47368->47613 47372 40da3b 47619 41ae08 28 API calls 47372->47619 47374 40d9f7 47374->47352 47376 40da13 47374->47376 47375 40da46 47620 401e18 11 API calls 47375->47620 47615 4064d0 97 API calls 47376->47615 47379 40da51 47621 401e13 11 API calls 47379->47621 47381 40da5a 47622 401d64 22 API calls 47381->47622 47383 40da63 47623 401d64 22 API calls 47383->47623 47385 40da7d 47624 401d64 22 API calls 47385->47624 47387 40da97 47625 401d64 22 API calls 47387->47625 47389 40db22 47392 40db2c 47389->47392 47397 40dcaa ___scrt_fastfail 47389->47397 47390 40dab0 47390->47389 47626 401d64 22 API calls 47390->47626 47393 40db35 47392->47393 47400 40dbb1 47392->47400 47632 401d64 22 API calls 47393->47632 47395 40db3e 47633 401d64 22 API calls 47395->47633 47396 40dac5 _wcslen 47396->47389 47627 401d64 22 API calls 47396->47627 47644 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 47397->47644 47399 40db50 47634 401d64 22 API calls 47399->47634 47423 40dbac ___scrt_fastfail 47400->47423 47402 40dae0 47628 401d64 22 API calls 47402->47628 47405 40db62 47635 401d64 22 API calls 47405->47635 47407 40daf5 47629 40c89e 31 API calls 47407->47629 47408 40dcef 47645 401d64 22 API calls 47408->47645 47412 40db8b 47636 401d64 22 API calls 47412->47636 47413 40dd16 47646 401f66 28 API calls 47413->47646 47414 40db08 47630 401e18 11 API calls 47414->47630 47416 40db14 47631 401e13 11 API calls 47416->47631 47419 40dd25 47647 4126d2 14 API calls 47419->47647 47421 40db9c 47637 40bc67 45 API calls _wcslen 47421->47637 47422 40db1d 47422->47389 47423->47400 47638 4128a2 31 API calls 47423->47638 47427 40dd3b 47648 401d64 22 API calls 47427->47648 47428 40dc45 ctype 47639 401d64 22 API calls 47428->47639 47430 40dd47 47649 43a5e7 39 API calls _strftime 47430->47649 47433 40dd54 47435 40dd81 47433->47435 47650 41beb0 86 API calls ___scrt_fastfail 47433->47650 47434 40dc5c 47434->47408 47640 401d64 22 API calls 47434->47640 47651 401f66 28 API calls 47435->47651 47437 40dc7e 47641 41ae08 28 API calls 47437->47641 47441 40dd65 CreateThread 47441->47435 47704 41c96f 10 API calls 47441->47704 47442 40dd96 47652 401f66 28 API calls 47442->47652 47443 40dc87 47642 40e219 109 API calls 47443->47642 47446 40dda5 47653 41a686 79 API calls 47446->47653 47447 40dc8c 47447->47408 47449 40dc93 47447->47449 47449->47319 47450 40ddaa 47654 401d64 22 API calls 47450->47654 47452 40ddb6 47655 401d64 22 API calls 47452->47655 47454 40ddcb 47656 401d64 22 API calls 47454->47656 47456 40ddeb 47657 43a5e7 39 API calls _strftime 47456->47657 47458 40ddf8 47658 401d64 22 API calls 47458->47658 47460 40de03 47659 401d64 22 API calls 47460->47659 47462 40de14 47660 401d64 22 API calls 47462->47660 47464 40de29 47661 401d64 22 API calls 47464->47661 47466 40de3a 47467 40de41 StrToIntA 47466->47467 47662 409517 142 API calls _wcslen 47467->47662 47469 40de53 47663 401d64 22 API calls 47469->47663 47471 40dea1 47666 401d64 22 API calls 47471->47666 47472 40de5c 47472->47471 47664 43360d 22 API calls 3 library calls 47472->47664 47475 40de71 47665 401d64 22 API calls 47475->47665 47477 40de84 47478 40de8b CreateThread 47477->47478 47478->47471 47705 419128 102 API calls 2 library calls 47478->47705 47479 40def9 47669 401d64 22 API calls 47479->47669 47480 40deb1 47480->47479 47667 43360d 22 API calls 3 library calls 47480->47667 47483 40dec6 47668 401d64 22 API calls 47483->47668 47485 40ded8 47488 40dedf CreateThread 47485->47488 47486 40df6c 47675 401d64 22 API calls 47486->47675 47487 40df02 47487->47486 47670 401d64 22 API calls 47487->47670 47488->47479 47703 419128 102 API calls 2 library calls 47488->47703 47491 40df1e 47671 401d64 22 API calls 47491->47671 47492 40df75 47493 40dfba 47492->47493 47676 401d64 22 API calls 47492->47676 47680 41a7a2 29 API calls 47493->47680 47497 40df33 47672 40c854 31 API calls 47497->47672 47498 40dfc3 47681 401e18 11 API calls 47498->47681 47499 40df8a 47677 401d64 22 API calls 47499->47677 47501 40dfce 47682 401e13 11 API calls 47501->47682 47503 40df46 47673 401e18 11 API calls 47503->47673 47506 40df9f 47678 43a5e7 39 API calls _strftime 47506->47678 47508 40dfd7 CreateThread 47511 40e004 47508->47511 47512 40dff8 CreateThread 47508->47512 47706 40e54f 82 API calls 47508->47706 47509 40df52 47674 401e13 11 API calls 47509->47674 47514 40e019 47511->47514 47515 40e00d CreateThread 47511->47515 47512->47511 47707 410f36 138 API calls 47512->47707 47519 40e073 47514->47519 47683 401f66 28 API calls 47514->47683 47515->47514 47708 411524 38 API calls ___scrt_fastfail 47515->47708 47517 40df5b CreateThread 47517->47486 47709 40196b 49 API calls _strftime 47517->47709 47518 40dfac 47679 40b95c 7 API calls 47518->47679 47688 41246e RegOpenKeyExA RegQueryValueExA RegCloseKey 47519->47688 47522 40e046 47684 404c9e 28 API calls 47522->47684 47525 40e08b 47527 40e12a 47525->47527 47689 41ae08 28 API calls 47525->47689 47526 40e053 47685 401f66 28 API calls 47526->47685 47696 40cbac 27 API calls 47527->47696 47531 40e062 47686 41a686 79 API calls 47531->47686 47532 40e12f 47697 413fd4 168 API calls _strftime 47532->47697 47533 40e0a4 47690 412584 31 API calls 47533->47690 47536 40e067 47687 401eea 11 API calls 47536->47687 47539 40e0ba 47691 401e13 11 API calls 47539->47691 47541 40e0ed DeleteFileW 47542 40e0f4 47541->47542 47543 40e0c5 47541->47543 47692 41ae08 28 API calls 47542->47692 47543->47541 47543->47542 47544 40e0db Sleep 47543->47544 47544->47543 47546 40e104 47693 41297a RegOpenKeyExW RegDeleteValueW 47546->47693 47548 40e117 47694 401e13 11 API calls 47548->47694 47550 40e121 47695 401e13 11 API calls 47550->47695 47711 44243b 47552->47711 47555->47245 47556->47252 47557->47249 47558->47259 47559->47261 47560->47264 47561->47239 47563->47268 47564->47270 47565->47272 47566->47275 47567->47278 47569 44dddb 47568->47569 47570 44ddd2 47568->47570 47569->47282 47573 44dcc8 48 API calls 4 library calls 47570->47573 47572->47282 47573->47569 47575 41bd22 LoadLibraryA GetProcAddress 47574->47575 47576 41bd12 GetModuleHandleA GetProcAddress 47574->47576 47577 41bd4b 32 API calls 47575->47577 47578 41bd3b LoadLibraryA GetProcAddress 47575->47578 47576->47575 47577->47287 47578->47577 47579->47289 47580->47291 47581->47293 47582->47295 47583->47297 47584->47299 47585->47305 47586->47308 47587->47311 47588->47314 47589->47318 47590->47321 47591->47325 47592->47327 47593->47329 47594->47331 47595->47333 47596->47342 47700 401e8f 47597->47700 47599 40bee1 CreateMutexA GetLastError 47599->47341 47600->47304 47601->47310 47602->47315 47604->47336 47605->47338 47606->47343 47607->47346 47608->47350 47609->47353 47610->47349 47611->47358 47612->47368 47613->47361 47614->47374 47615->47352 47616->47357 47617->47366 47618->47372 47619->47375 47620->47379 47621->47381 47622->47383 47623->47385 47624->47387 47625->47390 47626->47396 47627->47402 47628->47407 47629->47414 47630->47416 47631->47422 47632->47395 47633->47399 47634->47405 47635->47412 47636->47421 47637->47423 47638->47428 47639->47434 47640->47437 47641->47443 47642->47447 47643->47324 47644->47408 47645->47413 47646->47419 47647->47427 47648->47430 47649->47433 47650->47441 47651->47442 47652->47446 47653->47450 47654->47452 47655->47454 47656->47456 47657->47458 47658->47460 47659->47462 47660->47464 47661->47466 47662->47469 47663->47472 47664->47475 47665->47477 47666->47480 47667->47483 47668->47485 47669->47487 47670->47491 47671->47497 47672->47503 47673->47509 47674->47517 47675->47492 47676->47499 47677->47506 47678->47518 47679->47493 47680->47498 47681->47501 47682->47508 47683->47522 47684->47526 47685->47531 47686->47536 47687->47519 47688->47525 47689->47533 47690->47539 47691->47543 47692->47546 47693->47548 47694->47550 47695->47527 47696->47532 47702 419e89 104 API calls 47697->47702 47698->47359 47701 401e94 47700->47701 47710 411637 62 API calls 47707->47710 47712 442447 _abort 47711->47712 47713 442460 47712->47713 47714 44244e 47712->47714 47735 444acc EnterCriticalSection 47713->47735 47747 442595 GetModuleHandleW 47714->47747 47717 442453 47717->47713 47748 4425d9 GetModuleHandleExW 47717->47748 47718 442505 47736 442545 47718->47736 47722 4424dc 47726 4424f4 47722->47726 47757 443475 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47722->47757 47724 442522 47739 442554 47724->47739 47725 44254e 47759 456499 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47725->47759 47758 443475 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47726->47758 47727 442467 47727->47718 47727->47722 47756 4431ef 20 API calls _abort 47727->47756 47735->47727 47760 444b14 LeaveCriticalSection 47736->47760 47738 44251e 47738->47724 47738->47725 47761 447973 47739->47761 47742 442582 47745 4425d9 _abort 8 API calls 47742->47745 47743 442562 GetPEB 47743->47742 47744 442572 GetCurrentProcess TerminateProcess 47743->47744 47744->47742 47746 44258a ExitProcess 47745->47746 47747->47717 47749 442626 47748->47749 47750 442603 GetProcAddress 47748->47750 47752 442635 47749->47752 47753 44262c FreeLibrary 47749->47753 47751 442618 47750->47751 47751->47749 47754 433d2c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 47752->47754 47753->47752 47755 44245f 47754->47755 47755->47713 47756->47722 47757->47726 47758->47718 47760->47738 47762 447998 47761->47762 47766 44798e 47761->47766 47767 447174 47762->47767 47765 44255e 47765->47742 47765->47743 47774 433d2c 47766->47774 47768 4471a4 47767->47768 47772 4471a0 47767->47772 47768->47766 47769 4471c4 47769->47768 47771 4471d0 GetProcAddress 47769->47771 47773 4471e0 __crt_fast_encode_pointer 47771->47773 47772->47768 47772->47769 47781 447210 47772->47781 47773->47768 47775 433d37 IsProcessorFeaturePresent 47774->47775 47776 433d35 47774->47776 47778 4341a4 47775->47778 47776->47765 47788 434168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47778->47788 47780 434287 47780->47765 47782 447226 47781->47782 47783 447231 LoadLibraryExW 47781->47783 47782->47772 47784 44724e GetLastError 47783->47784 47785 447266 47783->47785 47784->47785 47786 447259 LoadLibraryExW 47784->47786 47785->47782 47787 44727d FreeLibrary 47785->47787 47786->47785 47787->47782 47788->47780

                            Control-flow Graph

                            APIs
                            • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                            • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                            • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                            • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                            • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                            • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                            • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                            • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                            • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                            • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                            • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                            • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc$HandleLibraryLoadModule
                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                            • API String ID: 384173800-625181639
                            • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                            • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                            • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                            • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                            • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                            • ExitProcess.KERNEL32 ref: 0044258E
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CurrentExitTerminate
                            • String ID:
                            • API String ID: 1703294689-0
                            • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                            • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                            • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                            • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88

                            Control-flow Graph

                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                            • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                            • CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                            • closesocket.WS2_32(?), ref: 0040481F
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                            • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                            • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                            • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                            • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                            • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                            • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                            • String ID:
                            • API String ID: 3658366068-0
                            • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                            • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                            • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                            • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 22 447210-447224 23 447226-44722f 22->23 24 447231-44724c LoadLibraryExW 22->24 25 447288-44728a 23->25 26 447275-44727b 24->26 27 44724e-447257 GetLastError 24->27 30 447284 26->30 31 44727d-44727e FreeLibrary 26->31 28 447266 27->28 29 447259-447264 LoadLibraryExW 27->29 33 447268-44726a 28->33 29->33 32 447286-447287 30->32 31->30 32->25 33->26 34 44726c-447273 33->34 34->32
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                            • GetLastError.KERNEL32(?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID:
                            • API String ID: 3177248105-0
                            • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                            • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                            • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                            • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 35 447174-44719e 36 4471a0-4471a2 35->36 37 447209 35->37 38 4471a4-4471a6 36->38 39 4471a8-4471ae 36->39 40 44720b-44720f 37->40 38->40 41 4471b0-4471b2 call 447210 39->41 42 4471ca 39->42 47 4471b7-4471ba 41->47 43 4471cc-4471ce 42->43 45 4471d0-4471de GetProcAddress 43->45 46 4471f9-447207 43->46 50 4471e0-4471e9 call 4333a7 45->50 51 4471f3 45->51 46->37 48 4471bc-4471c2 47->48 49 4471eb-4471f1 47->49 48->41 52 4471c4 48->52 49->43 50->38 51->46 52->42
                            APIs
                            • GetProcAddress.KERNEL32(00000000,?), ref: 004471D4
                            • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004471E1
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc__crt_fast_encode_pointer
                            • String ID: pH`=/
                            • API String ID: 2279764990-3904821703
                            • Opcode ID: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                            • Instruction ID: 6f7a2b722a2a1d8c8194c8cb68bd8fc2eac5a8381c6f9e3e6965fab01942ac9c
                            • Opcode Fuzzy Hash: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                            • Instruction Fuzzy Hash: 8A110233A041629BFB329F68EC4099B7395AB803747164672FD19AB344DB34EC4386E9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 55 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                            APIs
                            • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                            • GetLastError.KERNEL32 ref: 0040BEF1
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateErrorLastMutex
                            • String ID: (CG
                            • API String ID: 1925916568-4210230975
                            • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                            • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                            • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                            • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                            Control-flow Graph

                            APIs
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                              • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,1DC,?,00475B70,00473D54,00000000,?,?,?,?,00434431,?,0046D680,?), ref: 00437C37
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Exception@8Throw$ExceptionRaise
                            • String ID:
                            • API String ID: 3476068407-0
                            • Opcode ID: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                            • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                            • Opcode Fuzzy Hash: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                            • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 100 446aff-446b0b 101 446b3d-446b48 call 445354 100->101 102 446b0d-446b0f 100->102 110 446b4a-446b4c 101->110 104 446b11-446b12 102->104 105 446b28-446b39 RtlAllocateHeap 102->105 104->105 106 446b14-446b1b call 4447c5 105->106 107 446b3b 105->107 106->101 112 446b1d-446b26 call 442200 106->112 107->110 112->101 112->105
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                            • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                            • Opcode Fuzzy Hash: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                            • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                            APIs
                            • SetEvent.KERNEL32(?,?), ref: 00406F28
                            • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                            • DeleteFileW.KERNEL32(00000000), ref: 00407018
                              • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                              • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                              • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                              • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                              • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                              • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                              • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                              • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                              • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                            • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                            • DeleteFileA.KERNEL32(?), ref: 004078CC
                              • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                              • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                              • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                            • Sleep.KERNEL32(000007D0), ref: 00407976
                            • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                              • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                            • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                            • API String ID: 2918587301-599666313
                            • Opcode ID: fe774ec57ea4c9c98434e9a8a4b205946b127d152570ca2712e415059fb31443
                            • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                            • Opcode Fuzzy Hash: fe774ec57ea4c9c98434e9a8a4b205946b127d152570ca2712e415059fb31443
                            • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 0040508E
                              • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                              • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            • __Init_thread_footer.LIBCMT ref: 004050CB
                            • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                            • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                              • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                              • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                              • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                            • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                            • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                            • CloseHandle.KERNEL32 ref: 004053CD
                            • CloseHandle.KERNEL32 ref: 004053D5
                            • CloseHandle.KERNEL32 ref: 004053E7
                            • CloseHandle.KERNEL32 ref: 004053EF
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                            • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                            • API String ID: 3815868655-81343324
                            • Opcode ID: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                            • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                            • Opcode Fuzzy Hash: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                            • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                            APIs
                            • GetCurrentProcessId.KERNEL32 ref: 00410F45
                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                              • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                            • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                              • Part of subcall function 004124B7: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                              • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                              • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                            • CloseHandle.KERNEL32(00000000), ref: 00410F90
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                            • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                            • API String ID: 65172268-860466531
                            • Opcode ID: c59a9ba99b2cc187f19442751e4719393b3c5f539a1bb9958299626df8d8cbdd
                            • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                            • Opcode Fuzzy Hash: c59a9ba99b2cc187f19442751e4719393b3c5f539a1bb9958299626df8d8cbdd
                            • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                            • FindClose.KERNEL32(00000000), ref: 0040B3CE
                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                            • FindClose.KERNEL32(00000000), ref: 0040B517
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$CloseFile$FirstNext
                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                            • API String ID: 1164774033-3681987949
                            • Opcode ID: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                            • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                            • Opcode Fuzzy Hash: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                            • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                            • FindClose.KERNEL32(00000000), ref: 0040B5CC
                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                            • FindClose.KERNEL32(00000000), ref: 0040B6B2
                            • FindClose.KERNEL32(00000000), ref: 0040B6D1
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$Close$File$FirstNext
                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                            • API String ID: 3527384056-432212279
                            • Opcode ID: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                            • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                            • Opcode Fuzzy Hash: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                            • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                            • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                              • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                            • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                            • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                            • API String ID: 726551946-3025026198
                            • Opcode ID: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                            • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                            • Opcode Fuzzy Hash: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                            • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                            APIs
                            • OpenClipboard.USER32 ref: 004159C7
                            • EmptyClipboard.USER32 ref: 004159D5
                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                            • GlobalLock.KERNEL32(00000000), ref: 004159FE
                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                            • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                            • CloseClipboard.USER32 ref: 00415A5A
                            • OpenClipboard.USER32 ref: 00415A61
                            • GetClipboardData.USER32(0000000D), ref: 00415A71
                            • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                            • CloseClipboard.USER32 ref: 00415A89
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                            • String ID:
                            • API String ID: 3520204547-0
                            • Opcode ID: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                            • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                            • Opcode Fuzzy Hash: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                            • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 0$1$2$3$4$5$6$7
                            • API String ID: 0-3177665633
                            • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                            • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                            • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                            • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514C3
                            • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                            • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                            • GetLocaleInfoW.KERNEL32(?,00001001,<D,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                            • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 00451594
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                            • String ID: pH`=/$<D$<D$<D
                            • API String ID: 745075371-50088682
                            • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                            • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                            • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                            • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                            APIs
                            • GetForegroundWindow.USER32 ref: 00409B3F
                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                            • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                            • GetKeyState.USER32(00000010), ref: 00409B5C
                            • GetKeyboardState.USER32(?), ref: 00409B67
                            • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                            • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                            • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                            • String ID: 8[G
                            • API String ID: 1888522110-1691237782
                            • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                            • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                            • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                            • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                            APIs
                            • _wcslen.LIBCMT ref: 00406788
                            • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Object_wcslen
                            • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                            • API String ID: 240030777-3166923314
                            • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                            • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                            • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                            • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                            • GetLastError.KERNEL32 ref: 00419935
                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                            • String ID:
                            • API String ID: 3587775597-0
                            • Opcode ID: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                            • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                            • Opcode Fuzzy Hash: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                            • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B529
                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B536
                              • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                            • GetLastError.KERNEL32(?,?,?,?,?,?,00473EE8,00000000), ref: 0041B570
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B583
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                            • String ID:
                            • API String ID: 2341273852-0
                            • Opcode ID: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                            • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                            • Opcode Fuzzy Hash: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                            • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Find$CreateFirstNext
                            • String ID: @CG$XCG$`HG$`HG$>G
                            • API String ID: 341183262-3780268858
                            • Opcode ID: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                            • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                            • Opcode Fuzzy Hash: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                            • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                            • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                            • GetLastError.KERNEL32 ref: 00409A1B
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                            • TranslateMessage.USER32(?), ref: 00409A7A
                            • DispatchMessageA.USER32(?), ref: 00409A85
                            Strings
                            • Keylogger initialization failure: error , xrefs: 00409A32
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                            • String ID: Keylogger initialization failure: error
                            • API String ID: 3219506041-952744263
                            • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                            • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                            • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                            • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                            APIs
                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                            • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressCloseCreateLibraryLoadProcsend
                            • String ID: SHDeleteKeyW$Shlwapi.dll
                            • API String ID: 2127411465-314212984
                            • Opcode ID: 4bfa0ab92cfe4c7e273a593f9c438f6144fcaff52e32c91ef8c2f101195a9e69
                            • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                            • Opcode Fuzzy Hash: 4bfa0ab92cfe4c7e273a593f9c438f6144fcaff52e32c91ef8c2f101195a9e69
                            • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                            APIs
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                            • _free.LIBCMT ref: 00448067
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            • _free.LIBCMT ref: 00448233
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                            • String ID: pH`=/
                            • API String ID: 1286116820-3904821703
                            • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                            • Instruction ID: adcac59616ce0bf4d9b6f5e4feac4fc1c4b096f081e8a0f87c9a15d47e4c4f65
                            • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                            • Instruction Fuzzy Hash: 13510B719002099BE714DF69DC819AFB7BCEF41354F10456FE454A32A1EF389E46CB58
                            APIs
                              • Part of subcall function 004124B7: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                              • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                              • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                            • Sleep.KERNEL32(00000BB8), ref: 0040E603
                            • ExitProcess.KERNEL32 ref: 0040E672
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseExitOpenProcessQuerySleepValue
                            • String ID: 5.3.0 Pro$override$pth_unenc$BG
                            • API String ID: 2281282204-3981147832
                            • Opcode ID: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                            • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                            • Opcode Fuzzy Hash: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                            • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                            APIs
                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                            • GetLastError.KERNEL32 ref: 0040B261
                            Strings
                            • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                            • UserProfile, xrefs: 0040B227
                            • [Chrome StoredLogins not found], xrefs: 0040B27B
                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteErrorFileLast
                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                            • API String ID: 2018770650-1062637481
                            • Opcode ID: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                            • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                            • Opcode Fuzzy Hash: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                            • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                            APIs
                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                            • GetLastError.KERNEL32 ref: 00416B02
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                            • String ID: SeShutdownPrivilege
                            • API String ID: 3534403312-3733053543
                            • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                            • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                            • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                            • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                            APIs
                            • __EH_prolog.LIBCMT ref: 004089AE
                              • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                              • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                              • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                              • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                              • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                              • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                              • Part of subcall function 004047EB: CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                            • String ID:
                            • API String ID: 4043647387-0
                            • Opcode ID: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                            • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                            • Opcode Fuzzy Hash: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                            • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ManagerStart
                            • String ID:
                            • API String ID: 276877138-0
                            • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                            • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                            • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                            • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443CF3,?,?,?,?,?,?,00000004), ref: 00450B61
                            • _wcschr.LIBVCRUNTIME ref: 00450BF1
                            • _wcschr.LIBVCRUNTIME ref: 00450BFF
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443CF3,00000000,00443E13), ref: 00450CA2
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                            • String ID: pH`=/
                            • API String ID: 4212172061-3904821703
                            • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                            • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                            • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                            • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                            APIs
                              • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                              • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                              • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                              • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                              • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                            • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                            • GetProcAddress.KERNEL32(00000000), ref: 00415977
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                            • String ID: PowrProf.dll$SetSuspendState
                            • API String ID: 1589313981-1420736420
                            • Opcode ID: 760194600065aa930d76b91875d7e389ee81a04dff370ffb8731a3af4adaf024
                            • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                            • Opcode Fuzzy Hash: 760194600065aa930d76b91875d7e389ee81a04dff370ffb8731a3af4adaf024
                            • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                            APIs
                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 0045127C
                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 004512A5
                            • GetACP.KERNEL32(?,?,00451502,?,00000000), ref: 004512BA
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID: ACP$OCP
                            • API String ID: 2299586839-711371036
                            • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                            • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                            • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                            • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                            APIs
                            • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                            • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                            • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                            • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Resource$FindLoadLockSizeof
                            • String ID: SETTINGS
                            • API String ID: 3473537107-594951305
                            • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                            • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                            • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                            • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                            APIs
                            • __EH_prolog.LIBCMT ref: 00407A91
                            • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$File$CloseFirstH_prologNext
                            • String ID:
                            • API String ID: 1157919129-0
                            • Opcode ID: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                            • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                            • Opcode Fuzzy Hash: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                            • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: DownloadExecuteFileShell
                            • String ID: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe$open
                            • API String ID: 2825088817-2982761329
                            • Opcode ID: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                            • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                            • Opcode Fuzzy Hash: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                            • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorInfoLastLocale$_free$_abort
                            • String ID: pH`=/
                            • API String ID: 2829624132-3904821703
                            • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                            • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                            • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                            • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileFind$FirstNextsend
                            • String ID: x@G$x@G
                            • API String ID: 4113138495-3390264752
                            • Opcode ID: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                            • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                            • Opcode Fuzzy Hash: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                            • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                            APIs
                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                              • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                              • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                              • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateInfoParametersSystemValue
                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                            • API String ID: 4127273184-3576401099
                            • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                            • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                            • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                            • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                            APIs
                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0043A755
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A75F
                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0043A76C
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID: pH`=/
                            • API String ID: 3906539128-3904821703
                            • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                            • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                            • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                            • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                            APIs
                            • __EH_prolog.LIBCMT ref: 00408DAC
                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileFind$FirstH_prologNext
                            • String ID:
                            • API String ID: 301083792-0
                            • Opcode ID: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                            • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                            • Opcode Fuzzy Hash: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                            • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: .$pH`=/
                            • API String ID: 0-2958029893
                            • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                            • Instruction ID: db76f937e81630575b2700384d205b0ac401e8f874fa32e43cac1aabc581782c
                            • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                            • Instruction Fuzzy Hash: CB310471900209AFEB249E79CC84EEB7BBDDB86318F1101AEF91897251E6389D458B64
                            APIs
                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID: GetLocaleInfoEx$pH`=/
                            • API String ID: 2299586839-4170255952
                            • Opcode ID: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                            • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                            • Opcode Fuzzy Hash: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                            • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                            APIs
                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                            • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                            • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Crypt$Context$AcquireRandomRelease
                            • String ID:
                            • API String ID: 1815803762-0
                            • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                            • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                            • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                            • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free$InfoLocale_abort
                            • String ID: pH`=/
                            • API String ID: 1663032902-3904821703
                            • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                            • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                            • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                            • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                            • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,<D,?,00451497,00000000,?,?,?), ref: 00450DB4
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID: <D
                            • API String ID: 1084509184-3866323178
                            • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                            • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                            • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                            • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                            • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,<D,?,0045145B,<D,?,?,?,?,?,00443CEC,?,?), ref: 00450E29
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID: <D
                            • API String ID: 1084509184-3866323178
                            • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                            • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                            • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                            • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                            APIs
                              • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                            • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 004470E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalEnterEnumLocalesSectionSystem
                            • String ID: pH`=/
                            • API String ID: 1272433827-3904821703
                            • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                            • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                            • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                            • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$InfoLocale_abort_free
                            • String ID:
                            • API String ID: 2692324296-0
                            • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                            • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                            • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                            • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                            APIs
                            • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: NameUser
                            • String ID:
                            • API String ID: 2645101109-0
                            • Opcode ID: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                            • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                            • Opcode Fuzzy Hash: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                            • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                            • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,004514B9,<D,?,?,?,?,?,00443CEC,?,?,?), ref: 00450D2E
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID:
                            • API String ID: 1084509184-0
                            • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                            • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                            • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                            • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                            APIs
                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID:
                            • API String ID: 2299586839-0
                            • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                            • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                            • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                            • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                            APIs
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: recv
                            • String ID:
                            • API String ID: 1507349165-0
                            • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                            • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                            • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                            • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                            • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                            • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                            • Instruction Fuzzy Hash:
                            APIs
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: HeapProcess
                            • String ID:
                            • API String ID: 54951025-0
                            • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                            • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                            • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                            • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                            APIs
                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                            • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                              • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                            • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                            • DeleteDC.GDI32(?), ref: 0041805D
                            • DeleteDC.GDI32(00000000), ref: 00418060
                            • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                            • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                            • GetIconInfo.USER32(?,?), ref: 004180CB
                            • DeleteObject.GDI32(?), ref: 004180FA
                            • DeleteObject.GDI32(?), ref: 00418107
                            • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                            • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                            • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                            • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                            • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                            • DeleteDC.GDI32(?), ref: 0041827F
                            • DeleteDC.GDI32(00000000), ref: 00418282
                            • DeleteObject.GDI32(00000000), ref: 00418285
                            • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                            • DeleteObject.GDI32(00000000), ref: 00418344
                            • GlobalFree.KERNEL32(?), ref: 0041834B
                            • DeleteDC.GDI32(?), ref: 0041835B
                            • DeleteDC.GDI32(00000000), ref: 00418366
                            • DeleteDC.GDI32(?), ref: 00418398
                            • DeleteDC.GDI32(00000000), ref: 0041839B
                            • DeleteObject.GDI32(?), ref: 004183A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                            • String ID: DISPLAY
                            • API String ID: 1765752176-865373369
                            • Opcode ID: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                            • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                            • Opcode Fuzzy Hash: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                            • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                            • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                            • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                            • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                            • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                            • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                            • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                            • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                            • ResumeThread.KERNEL32(?), ref: 00417582
                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                            • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                            • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                            • GetLastError.KERNEL32 ref: 004175C7
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                            • API String ID: 4188446516-3035715614
                            • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                            • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                            • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                            • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                            APIs
                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                            • ExitProcess.KERNEL32 ref: 0041151D
                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                            • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                              • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                            • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                            • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                            • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                              • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                              • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                              • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                            • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                            • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                              • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                            • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                            • API String ID: 4250697656-2665858469
                            • Opcode ID: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                            • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                            • Opcode Fuzzy Hash: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                            • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                            APIs
                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00000000,?,0040C2B0,?,00000000), ref: 0040AFC9
                              • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,0040C2B0,?,00000000), ref: 0040AFE3
                              • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                            • ExitProcess.KERNEL32 ref: 0040C63E
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                            • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                            • API String ID: 1861856835-3168347843
                            • Opcode ID: 1fca09a02b8493e53294f51d4634f72964b40bbef437048ec22e150e28ca3ccf
                            • Instruction ID: c8b5e11b4abf5c95f8ab28b2bb359051ef64700817c412cd349ec45860bdb676
                            • Opcode Fuzzy Hash: 1fca09a02b8493e53294f51d4634f72964b40bbef437048ec22e150e28ca3ccf
                            • Instruction Fuzzy Hash: EB9175316042005AC314FB25D852ABF7799AF91718F10453FF98A631E2EF7CAD49C69E
                            APIs
                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00000000,?,0040C2B0,?,00000000), ref: 0040AFC9
                              • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,0040C2B0,?,00000000), ref: 0040AFE3
                              • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                            • ExitProcess.KERNEL32 ref: 0040C287
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                            • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                            • API String ID: 3797177996-1998216422
                            • Opcode ID: c4cc4d00899e4284936be169aaff6719d95b62d3fffb22ecd15678fbb4326d45
                            • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                            • Opcode Fuzzy Hash: c4cc4d00899e4284936be169aaff6719d95b62d3fffb22ecd15678fbb4326d45
                            • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                            APIs
                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                            • SetEvent.KERNEL32 ref: 0041A38A
                            • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                            • CloseHandle.KERNEL32 ref: 0041A3AB
                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                            • API String ID: 738084811-1408154895
                            • Opcode ID: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                            • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                            • Opcode Fuzzy Hash: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                            • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                            APIs
                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                            • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                            • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                            • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Write$Create
                            • String ID: RIFF$WAVE$data$fmt
                            • API String ID: 1602526932-4212202414
                            • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                            • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                            • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                            • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                            APIs
                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe,00000001,004068B2,C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                            • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                            • GetProcAddress.KERNEL32(00000000), ref: 00406511
                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                            • GetProcAddress.KERNEL32(00000000), ref: 00406525
                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                            • GetProcAddress.KERNEL32(00000000), ref: 00406539
                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                            • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                            • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                            • GetProcAddress.KERNEL32(00000000), ref: 00406561
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                            • API String ID: 1646373207-2167524772
                            • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                            • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                            • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                            • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                            APIs
                            • _wcslen.LIBCMT ref: 0040BC75
                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                            • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                            • _wcslen.LIBCMT ref: 0040BD54
                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                            • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe,00000000,00000000), ref: 0040BDF2
                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                            • _wcslen.LIBCMT ref: 0040BE34
                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                            • ExitProcess.KERNEL32 ref: 0040BED0
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                            • String ID: 6$C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe$del$open$BG$BG
                            • API String ID: 1579085052-1260396914
                            • Opcode ID: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                            • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                            • Opcode Fuzzy Hash: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                            • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$Info
                            • String ID: pH`=/
                            • API String ID: 2509303402-3904821703
                            • Opcode ID: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                            • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                            • Opcode Fuzzy Hash: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                            • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                            APIs
                            • lstrlenW.KERNEL32(?), ref: 0041B1D6
                            • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                            • lstrlenW.KERNEL32(?), ref: 0041B207
                            • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                            • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                            • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                            • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                            • _wcslen.LIBCMT ref: 0041B2DB
                            • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                            • GetLastError.KERNEL32 ref: 0041B313
                            • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                            • lstrcatW.KERNEL32(?,?), ref: 0041B359
                            • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                            • GetLastError.KERNEL32 ref: 0041B370
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                            • String ID: ?
                            • API String ID: 3941738427-1684325040
                            • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                            • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                            • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                            • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                            APIs
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$EnvironmentVariable$_wcschr
                            • String ID:
                            • API String ID: 3899193279-0
                            • Opcode ID: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                            • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                            • Opcode Fuzzy Hash: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                            • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                              • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                              • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                              • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                            • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                            • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                            • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                            • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                            • Sleep.KERNEL32(00000064), ref: 00412060
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                            • String ID: /stext "$HDG$HDG$>G$>G
                            • API String ID: 1223786279-3931108886
                            • Opcode ID: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                            • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                            • Opcode Fuzzy Hash: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                            • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                            • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                            • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                            • LoadLibraryA.KERNEL32(?), ref: 00413F27
                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                            • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                            • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                            • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                            • API String ID: 2490988753-744132762
                            • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                            • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                            • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                            • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B846
                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B88A
                            • RegCloseKey.ADVAPI32(?), ref: 0041BB54
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnumOpen
                            • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                            • API String ID: 1332880857-3714951968
                            • Opcode ID: c129c5d3b2225b1f8cda05c9a3a6c18510288d4317852ec5d704d9b0c7986d58
                            • Instruction ID: 4ca6cd9db44c7b11bab16217f2b7ba144dfc64e74838f3250c32f9e768a6938f
                            • Opcode Fuzzy Hash: c129c5d3b2225b1f8cda05c9a3a6c18510288d4317852ec5d704d9b0c7986d58
                            • Instruction Fuzzy Hash: 8C812E311082449BD324EB11DC51AEFB7E9FFD4314F10493FB58A921E1EF74AA49CA9A
                            APIs
                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                            • GetCursorPos.USER32(?), ref: 0041CAF8
                            • SetForegroundWindow.USER32(?), ref: 0041CB01
                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                            • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                            • ExitProcess.KERNEL32 ref: 0041CB74
                            • CreatePopupMenu.USER32 ref: 0041CB7A
                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                            • String ID: Close
                            • API String ID: 1657328048-3535843008
                            • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                            • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                            • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                            • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                            • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                            • __aulldiv.LIBCMT ref: 00407FE9
                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                            • CloseHandle.KERNEL32(00000000), ref: 00408200
                            • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                            • CloseHandle.KERNEL32(00000000), ref: 00408256
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                            • API String ID: 1884690901-3066803209
                            • Opcode ID: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                            • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                            • Opcode Fuzzy Hash: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                            • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                            APIs
                            • Sleep.KERNEL32(00001388), ref: 00409E62
                              • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                              • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                              • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                              • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                            • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0040A049
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                            • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                            • API String ID: 3795512280-3163867910
                            • Opcode ID: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                            • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                            • Opcode Fuzzy Hash: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                            • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A
                            APIs
                            • ___free_lconv_mon.LIBCMT ref: 004500B1
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                            • _free.LIBCMT ref: 004500A6
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            • _free.LIBCMT ref: 004500C8
                            • _free.LIBCMT ref: 004500DD
                            • _free.LIBCMT ref: 004500E8
                            • _free.LIBCMT ref: 0045010A
                            • _free.LIBCMT ref: 0045011D
                            • _free.LIBCMT ref: 0045012B
                            • _free.LIBCMT ref: 00450136
                            • _free.LIBCMT ref: 0045016E
                            • _free.LIBCMT ref: 00450175
                            • _free.LIBCMT ref: 00450192
                            • _free.LIBCMT ref: 004501AA
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                            • String ID:
                            • API String ID: 161543041-0
                            • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                            • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                            • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                            • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                            APIs
                            • __EH_prolog.LIBCMT ref: 0041912D
                            • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                            • Sleep.KERNEL32(000003E8), ref: 0041926D
                            • GetLocalTime.KERNEL32(?), ref: 0041927C
                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                            • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                            • API String ID: 489098229-65789007
                            • Opcode ID: a40dca5e55645720ca30496181093a362b70aa5652279529810e28997b425322
                            • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                            • Opcode Fuzzy Hash: a40dca5e55645720ca30496181093a362b70aa5652279529810e28997b425322
                            • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                            APIs
                            • connect.WS2_32(?,?,?), ref: 004042A5
                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                            • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                            • API String ID: 994465650-2151626615
                            • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                            • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                            • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                            • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                            APIs
                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                            • ExitProcess.KERNEL32 ref: 0040C832
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                            • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                            • API String ID: 1913171305-390638927
                            • Opcode ID: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                            • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                            • Opcode Fuzzy Hash: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                            • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                            APIs
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                            • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                            • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                            • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                            APIs
                              • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                            • GetLastError.KERNEL32 ref: 00454A96
                            • __dosmaperr.LIBCMT ref: 00454A9D
                            • GetFileType.KERNEL32(00000000), ref: 00454AA9
                            • GetLastError.KERNEL32 ref: 00454AB3
                            • __dosmaperr.LIBCMT ref: 00454ABC
                            • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                            • CloseHandle.KERNEL32(?), ref: 00454C26
                            • GetLastError.KERNEL32 ref: 00454C58
                            • __dosmaperr.LIBCMT ref: 00454C5F
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                            • String ID: H
                            • API String ID: 4237864984-2852464175
                            • Opcode ID: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                            • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                            • Opcode Fuzzy Hash: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                            • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                            APIs
                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E03,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BD6
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C59
                            • __alloca_probe_16.LIBCMT ref: 00452C91
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E03,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CEC
                            • __alloca_probe_16.LIBCMT ref: 00452D3B
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D03
                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D7F
                            • __freea.LIBCMT ref: 00452DAA
                            • __freea.LIBCMT ref: 00452DB6
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                            • String ID: pH`=/
                            • API String ID: 201697637-3904821703
                            • Opcode ID: 51fcd5d0f12c7252ccb3cdd53779652c124c35418bee1affee7c5fbc1305f75c
                            • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                            • Opcode Fuzzy Hash: 51fcd5d0f12c7252ccb3cdd53779652c124c35418bee1affee7c5fbc1305f75c
                            • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 0040A456
                            • Sleep.KERNEL32(000001F4), ref: 0040A461
                            • GetForegroundWindow.USER32 ref: 0040A467
                            • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                            • Sleep.KERNEL32(000003E8), ref: 0040A574
                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                            • String ID: [${ User has been idle for $ minutes }$]
                            • API String ID: 911427763-3954389425
                            • Opcode ID: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                            • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                            • Opcode Fuzzy Hash: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                            • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 65535$udp
                            • API String ID: 0-1267037602
                            • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                            • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                            • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                            • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                            APIs
                            • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: LongNamePath
                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                            • API String ID: 82841172-425784914
                            • Opcode ID: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                            • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                            • Opcode Fuzzy Hash: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                            • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                            • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                            • __dosmaperr.LIBCMT ref: 004393CD
                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                            • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                            • __dosmaperr.LIBCMT ref: 0043940A
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                            • __dosmaperr.LIBCMT ref: 0043945E
                            • _free.LIBCMT ref: 0043946A
                            • _free.LIBCMT ref: 00439471
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                            • String ID:
                            • API String ID: 2441525078-0
                            • Opcode ID: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                            • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                            • Opcode Fuzzy Hash: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                            • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                            • __alloca_probe_16.LIBCMT ref: 004499E2
                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                            • __alloca_probe_16.LIBCMT ref: 00449AC7
                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                            • __freea.LIBCMT ref: 00449B37
                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                            • __freea.LIBCMT ref: 00449B40
                            • __freea.LIBCMT ref: 00449B65
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                            • String ID: pH`=/
                            • API String ID: 3864826663-3904821703
                            • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                            • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                            • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                            • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                            APIs
                            • SetEvent.KERNEL32(?,?), ref: 00404E71
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                            • TranslateMessage.USER32(?), ref: 00404F30
                            • DispatchMessageA.USER32(?), ref: 00404F3B
                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                            • String ID: CloseChat$DisplayMessage$GetMessage
                            • API String ID: 2956720200-749203953
                            • Opcode ID: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                            • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                            • Opcode Fuzzy Hash: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                            • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                            APIs
                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: DecodePointer
                            • String ID: acos$asin$exp$log$log10$pH`=/$pow$sqrt
                            • API String ID: 3527080286-1992670505
                            • Opcode ID: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                            • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                            • Opcode Fuzzy Hash: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                            • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                            APIs
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                            • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                            • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                            • String ID: <$@$@FG$@FG$Temp
                            • API String ID: 1107811701-2245803885
                            • Opcode ID: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                            • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                            • Opcode Fuzzy Hash: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                            • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                            APIs
                            • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                            • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe), ref: 00406705
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CurrentProcess
                            • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                            • API String ID: 2050909247-4145329354
                            • Opcode ID: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                            • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                            • Opcode Fuzzy Hash: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                            • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                            • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                            • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                            • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                            APIs
                            • _free.LIBCMT ref: 00446DDF
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            • _free.LIBCMT ref: 00446DEB
                            • _free.LIBCMT ref: 00446DF6
                            • _free.LIBCMT ref: 00446E01
                            • _free.LIBCMT ref: 00446E0C
                            • _free.LIBCMT ref: 00446E17
                            • _free.LIBCMT ref: 00446E22
                            • _free.LIBCMT ref: 00446E2D
                            • _free.LIBCMT ref: 00446E38
                            • _free.LIBCMT ref: 00446E46
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                            • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                            • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                            • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                            APIs
                            • _free.LIBCMT ref: 00447EBC
                            • _free.LIBCMT ref: 00447EE0
                            • _free.LIBCMT ref: 00448067
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                            • _free.LIBCMT ref: 00448233
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                            • String ID: pH`=/
                            • API String ID: 314583886-3904821703
                            • Opcode ID: 27ecba2f8841fd9bc374cbfe0ae16a2ddc94f833dde90b0adb5aed01379e1676
                            • Instruction ID: d74e55ca02e924b9256a88f94e7be2aa31ce1fd8fbfcff02d88bcfbefc6cbd9d
                            • Opcode Fuzzy Hash: 27ecba2f8841fd9bc374cbfe0ae16a2ddc94f833dde90b0adb5aed01379e1676
                            • Instruction Fuzzy Hash: 32C12871904205ABFB24DF799C41AAE7BB8EF46314F2441AFE484A7351EB388E47C758
                            APIs
                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                            • _memcmp.LIBVCRUNTIME ref: 004446A3
                            • _free.LIBCMT ref: 00444714
                            • _free.LIBCMT ref: 0044472D
                            • _free.LIBCMT ref: 0044475F
                            • _free.LIBCMT ref: 00444768
                            • _free.LIBCMT ref: 00444774
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorLast$_abort_memcmp
                            • String ID: C$pH`=/
                            • API String ID: 1679612858-1513019744
                            • Opcode ID: b3bb612f52cd01851518acec42876c64f75404bfee4e20e1c1da8053f10e2069
                            • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                            • Opcode Fuzzy Hash: b3bb612f52cd01851518acec42876c64f75404bfee4e20e1c1da8053f10e2069
                            • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Eventinet_ntoa
                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                            • API String ID: 3578746661-4192532303
                            • Opcode ID: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                            • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                            • Opcode Fuzzy Hash: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                            • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                            APIs
                            • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                            • __fassign.LIBCMT ref: 0044A180
                            • __fassign.LIBCMT ref: 0044A19B
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                            • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                            • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                            • String ID: pH`=/
                            • API String ID: 1324828854-3904821703
                            • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                            • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                            • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                            • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                            • Sleep.KERNEL32(00000064), ref: 00416688
                            • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CreateDeleteExecuteShellSleep
                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                            • API String ID: 1462127192-2001430897
                            • Opcode ID: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                            • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                            • Opcode Fuzzy Hash: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                            • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                            APIs
                            • _strftime.LIBCMT ref: 00401AD3
                              • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                            • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                            • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                            • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                            • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                            • API String ID: 3809562944-3643129801
                            • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                            • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                            • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                            • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                            APIs
                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                            • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                            • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                            • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                            • waveInStart.WINMM ref: 00401A81
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                            • String ID: XCG$`=G$x=G
                            • API String ID: 1356121797-903574159
                            • Opcode ID: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                            • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                            • Opcode Fuzzy Hash: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                            • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                              • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                              • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                              • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                            • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                            • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                            • TranslateMessage.USER32(?), ref: 0041C9FB
                            • DispatchMessageA.USER32(?), ref: 0041CA05
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                            • String ID: Remcos
                            • API String ID: 1970332568-165870891
                            • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                            • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                            • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                            • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                            • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                            • Opcode Fuzzy Hash: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                            • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: tcp$udp
                            • API String ID: 0-3725065008
                            • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                            • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                            • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                            • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                            APIs
                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                            • _free.LIBCMT ref: 00444086
                            • _free.LIBCMT ref: 0044409D
                            • _free.LIBCMT ref: 004440BC
                            • _free.LIBCMT ref: 004440D7
                            • _free.LIBCMT ref: 004440EE
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$AllocateHeap
                            • String ID: J7D$pH`=/
                            • API String ID: 3033488037-542703555
                            • Opcode ID: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                            • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                            • Opcode Fuzzy Hash: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                            • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                            APIs
                            • ExitThread.KERNEL32 ref: 004017F4
                              • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                              • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                            • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                              • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                            • __Init_thread_footer.LIBCMT ref: 004017BC
                              • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                              • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                            • String ID: T=G$p[G$>G$>G
                            • API String ID: 1596592924-2461731529
                            • Opcode ID: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                            • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                            • Opcode Fuzzy Hash: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                            • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                            APIs
                            • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                            • _ValidateLocalCookies.LIBCMT ref: 00437B41
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                            • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm$pH`=/
                            • API String ID: 1170836740-2124025358
                            • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                            • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                            • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                            • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                            APIs
                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                              • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                              • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                            • String ID: .part
                            • API String ID: 1303771098-3499674018
                            • Opcode ID: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                            • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                            • Opcode Fuzzy Hash: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                            • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                            APIs
                              • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                              • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                              • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                              • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                            • _wcslen.LIBCMT ref: 0041A8F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                            • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                            • API String ID: 37874593-703403762
                            • Opcode ID: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                            • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                            • Opcode Fuzzy Hash: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                            • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                            APIs
                            • SendInput.USER32 ref: 00418B08
                            • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                            • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                              • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: InputSend$Virtual
                            • String ID:
                            • API String ID: 1167301434-0
                            • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                            • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                            • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                            • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                            APIs
                            • OpenClipboard.USER32 ref: 00415A46
                            • EmptyClipboard.USER32 ref: 00415A54
                            • CloseClipboard.USER32 ref: 00415A5A
                            • OpenClipboard.USER32 ref: 00415A61
                            • GetClipboardData.USER32(0000000D), ref: 00415A71
                            • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                            • CloseClipboard.USER32 ref: 00415A89
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                            • String ID:
                            • API String ID: 2172192267-0
                            • Opcode ID: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                            • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                            • Opcode Fuzzy Hash: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                            • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: __freea$__alloca_probe_16
                            • String ID: a/p$am/pm$pH`=/
                            • API String ID: 3509577899-180261828
                            • Opcode ID: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                            • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                            • Opcode Fuzzy Hash: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                            • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: pH`=/
                            • API String ID: 0-3904821703
                            • Opcode ID: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                            • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                            • Opcode Fuzzy Hash: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                            • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                            APIs
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                            • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                            • Opcode Fuzzy Hash: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                            • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: HE$HE
                            • API String ID: 269201875-1978648262
                            • Opcode ID: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                            • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                            • Opcode Fuzzy Hash: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                            • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                            APIs
                            • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                              • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                              • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnumInfoOpenQuerysend
                            • String ID: TUFTUF$>G$DG$DG
                            • API String ID: 3114080316-344394840
                            • Opcode ID: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                            • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                            • Opcode Fuzzy Hash: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                            • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: pH`=/
                            • API String ID: 269201875-3904821703
                            • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                            • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                            • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                            • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53), ref: 0044FF20
                            • __alloca_probe_16.LIBCMT ref: 0044FF58
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?), ref: 0044FFA9
                            • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?,00000002,?), ref: 0044FFBB
                            • __freea.LIBCMT ref: 0044FFC4
                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                            • String ID: pH`=/
                            • API String ID: 313313983-3904821703
                            • Opcode ID: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                            • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                            • Opcode Fuzzy Hash: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                            • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                            APIs
                              • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                              • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                              • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                            • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                            • API String ID: 1133728706-4073444585
                            • Opcode ID: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                            • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                            • Opcode Fuzzy Hash: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                            • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                            • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                            • Opcode Fuzzy Hash: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                            • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                            • int.LIBCPMT ref: 0040FC0F
                              • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                              • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                            • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                            • String ID: P[G
                            • API String ID: 2536120697-571123470
                            • Opcode ID: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                            • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                            • Opcode Fuzzy Hash: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                            • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                            APIs
                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                            • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                            • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                            Strings
                            • http://geoplugin.net/json.gp, xrefs: 0041A54E
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Internet$CloseHandleOpen$FileRead
                            • String ID: http://geoplugin.net/json.gp
                            • API String ID: 3121278467-91888290
                            • Opcode ID: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                            • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                            • Opcode Fuzzy Hash: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                            • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                            APIs
                              • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                            • _free.LIBCMT ref: 0044FD29
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            • _free.LIBCMT ref: 0044FD34
                            • _free.LIBCMT ref: 0044FD3F
                            • _free.LIBCMT ref: 0044FD93
                            • _free.LIBCMT ref: 0044FD9E
                            • _free.LIBCMT ref: 0044FDA9
                            • _free.LIBCMT ref: 0044FDB4
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                            • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                            • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                            • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                            APIs
                              • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                              • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                              • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                              • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                            • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCurrentOpenProcessQueryValue
                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                            • API String ID: 1866151309-2070987746
                            • Opcode ID: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                            • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                            • Opcode Fuzzy Hash: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                            • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE
                            APIs
                            • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe), ref: 00406835
                              • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                              • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                            • CoUninitialize.OLE32 ref: 0040688E
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: InitializeObjectUninitialize_wcslen
                            • String ID: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                            • API String ID: 3851391207-2232290974
                            • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                            • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                            • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                            • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                            • int.LIBCPMT ref: 0040FEF2
                              • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                              • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                            • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                            • String ID: H]G
                            • API String ID: 2536120697-1717957184
                            • Opcode ID: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                            • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                            • Opcode Fuzzy Hash: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                            • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                            APIs
                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                            • GetLastError.KERNEL32 ref: 0040B2EE
                            Strings
                            • [Chrome Cookies found, cleared!], xrefs: 0040B314
                            • UserProfile, xrefs: 0040B2B4
                            • [Chrome Cookies not found], xrefs: 0040B308
                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteErrorFileLast
                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                            • API String ID: 2018770650-304995407
                            • Opcode ID: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                            • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                            • Opcode Fuzzy Hash: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                            • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                            APIs
                            • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                            • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                            • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Console$AllocOutputShowWindow
                            • String ID: Remcos v$5.3.0 Pro$CONOUT$
                            • API String ID: 2425139147-2527699604
                            • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                            • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                            • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                            • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: (CG$C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe$BG
                            • API String ID: 0-3821178717
                            • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                            • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                            • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                            • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                            • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll$pH`=/
                            • API String ID: 4061214504-2634114653
                            • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                            • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                            • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                            • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                            APIs
                            • __allrem.LIBCMT ref: 00439789
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                            • __allrem.LIBCMT ref: 004397BC
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                            • __allrem.LIBCMT ref: 004397F1
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                            • String ID:
                            • API String ID: 1992179935-0
                            • Opcode ID: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                            • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                            • Opcode Fuzzy Hash: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                            • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                            APIs
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: __cftoe
                            • String ID:
                            • API String ID: 4189289331-0
                            • Opcode ID: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                            • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                            • Opcode Fuzzy Hash: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                            • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 00403E8A
                              • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: H_prologSleep
                            • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                            • API String ID: 3469354165-462540288
                            • Opcode ID: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                            • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                            • Opcode Fuzzy Hash: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                            • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                            • String ID:
                            • API String ID: 493672254-0
                            • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                            • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                            • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                            • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                            APIs
                            • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                            • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                            • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                            • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                            • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                            APIs
                            • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                            • _free.LIBCMT ref: 00446EF6
                            • _free.LIBCMT ref: 00446F1E
                            • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                            • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                            • _abort.LIBCMT ref: 00446F3D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free$_abort
                            • String ID:
                            • API String ID: 3160817290-0
                            • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                            • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                            • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                            • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                            • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                            • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                            • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                            • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                            • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                            • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                            • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                            • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                            • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                            APIs
                            • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Enum$InfoQueryValue
                            • String ID: [regsplt]$DG
                            • API String ID: 3554306468-1089238109
                            • Opcode ID: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                            • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                            • Opcode Fuzzy Hash: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                            • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                            APIs
                            • _strpbrk.LIBCMT ref: 0044D4A8
                            • _free.LIBCMT ref: 0044D5C5
                              • Part of subcall function 0043A854: IsProcessorFeaturePresent.KERNEL32(00000017,0043A826,?,?,00401962,?,?,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000), ref: 0043A856
                              • Part of subcall function 0043A854: GetCurrentProcess.KERNEL32(C0000417), ref: 0043A878
                              • Part of subcall function 0043A854: TerminateProcess.KERNEL32(00000000), ref: 0043A87F
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                            • String ID: *?$.$pH`=/
                            • API String ID: 2812119850-442676219
                            • Opcode ID: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                            • Instruction ID: 2d4433a3afc190a5690657b280c6536bac4d5ba0d1806d6c31be7b1549e3be36
                            • Opcode Fuzzy Hash: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                            • Instruction Fuzzy Hash: 7251B371E00109AFEF14DFA9C881AAEB7F5EF58318F24416FE854E7301DA799E018B54
                            APIs
                              • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                              • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                              • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                            • __Init_thread_footer.LIBCMT ref: 0040AEA7
                              • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                              • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                            • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                            • API String ID: 2974294136-753205382
                            • Opcode ID: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                            • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                            • Opcode Fuzzy Hash: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                            • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                            APIs
                            • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                            • wsprintfW.USER32 ref: 0040A905
                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: EventLocalTimewsprintf
                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                            • API String ID: 1497725170-248792730
                            • Opcode ID: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                            • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                            • Opcode Fuzzy Hash: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                            • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                            • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                            • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateHandleSizeSleep
                            • String ID: `AG
                            • API String ID: 1958988193-3058481221
                            • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                            • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                            • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                            • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                            APIs
                            • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                            • GetLastError.KERNEL32 ref: 0041CA91
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ClassCreateErrorLastRegisterWindow
                            • String ID: 0$MsgWindowClass
                            • API String ID: 2877667751-2410386613
                            • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                            • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                            • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                            • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                            APIs
                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                            • CloseHandle.KERNEL32(?), ref: 00406A0F
                            • CloseHandle.KERNEL32(?), ref: 00406A14
                            Strings
                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                            • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandle$CreateProcess
                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                            • API String ID: 2922976086-4183131282
                            • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                            • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                            • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                            • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                            • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                            • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                            • String ID: KeepAlive | Disabled
                            • API String ID: 2993684571-305739064
                            • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                            • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                            • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                            • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                            APIs
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                            • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                            • Sleep.KERNEL32(00002710), ref: 00419F79
                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: PlaySound$HandleLocalModuleSleepTime
                            • String ID: Alarm triggered
                            • API String ID: 614609389-2816303416
                            • Opcode ID: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                            • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                            • Opcode Fuzzy Hash: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                            • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                            APIs
                            • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                            • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                            • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                            • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                            Strings
                            • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Console$AttributeText$BufferHandleInfoScreen
                            • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                            • API String ID: 3024135584-2418719853
                            • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                            • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                            • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                            • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                            APIs
                              • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                            • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                            • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                            • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                            • String ID:
                            • API String ID: 3525466593-0
                            • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                            • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                            • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                            • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                            APIs
                              • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                            • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                              • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                            • String ID:
                            • API String ID: 4269425633-0
                            • Opcode ID: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                            • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                            • Opcode Fuzzy Hash: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                            • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                            • _free.LIBCMT ref: 0044E1A0
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                            • String ID:
                            • API String ID: 336800556-0
                            • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                            • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                            • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                            • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                            APIs
                            • GetLastError.KERNEL32(?,00000000,00000000,0043A7C2,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08,?), ref: 00446F48
                            • _free.LIBCMT ref: 00446F7D
                            • _free.LIBCMT ref: 00446FA4
                            • SetLastError.KERNEL32(00000000), ref: 00446FB1
                            • SetLastError.KERNEL32(00000000), ref: 00446FBA
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free
                            • String ID:
                            • API String ID: 3170660625-0
                            • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                            • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                            • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                            • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                            APIs
                            • _free.LIBCMT ref: 0044F7B5
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            • _free.LIBCMT ref: 0044F7C7
                            • _free.LIBCMT ref: 0044F7D9
                            • _free.LIBCMT ref: 0044F7EB
                            • _free.LIBCMT ref: 0044F7FD
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                            • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                            • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                            • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                            APIs
                            • _free.LIBCMT ref: 00443305
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            • _free.LIBCMT ref: 00443317
                            • _free.LIBCMT ref: 0044332A
                            • _free.LIBCMT ref: 0044333B
                            • _free.LIBCMT ref: 0044334C
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                            • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                            • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                            • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: pH`=/
                            • API String ID: 0-3904821703
                            • Opcode ID: 9e83a2b49866c0a0954c16d09c1b4fdebb0170e65fb9d01d1df359b3d0c5ec62
                            • Instruction ID: a0d53aee4b5e9eea03328ee1fc287b0911d13aa7d57878389234cb538b708088
                            • Opcode Fuzzy Hash: 9e83a2b49866c0a0954c16d09c1b4fdebb0170e65fb9d01d1df359b3d0c5ec62
                            • Instruction Fuzzy Hash: 3251B671D802099BEF14EFA5C845FAFBBB4EF09314F14005BE804A7252DA799952C76B
                            APIs
                            • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                            • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                            • IsWindowVisible.USER32(?), ref: 004167A1
                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessWindow$Open$TextThreadVisible
                            • String ID: (FG
                            • API String ID: 3142014140-2273637114
                            • Opcode ID: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                            • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                            • Opcode Fuzzy Hash: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                            • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                            APIs
                            • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                              • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                              • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                              • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                            • String ID: XCG$`AG$>G
                            • API String ID: 2334542088-2372832151
                            • Opcode ID: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                            • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                            • Opcode Fuzzy Hash: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                            • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                            APIs
                            • _free.LIBCMT ref: 00451D30
                              • Part of subcall function 00451B20: __alloca_probe_16.LIBCMT ref: 00451B89
                              • Part of subcall function 00451B20: WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,00001004,00000000,00000000,?,00000080,00000000,00000000,?,00000080,00000000,00000000), ref: 00451BE6
                              • Part of subcall function 00451B20: __freea.LIBCMT ref: 00451BEF
                            • _free.LIBCMT ref: 00451C86
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00451CC1
                              • Part of subcall function 00448706: HeapAlloc.KERNEL32(00000008,?,00000000,?,00446F74,00000001,00000364,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08), ref: 00448747
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorHeapLast_free$AllocByteCharFreeMultiWide__alloca_probe_16__freea
                            • String ID: pH`=/
                            • API String ID: 1317440246-3904821703
                            • Opcode ID: fa74662142cd5858ff4d6864a187426225f9c372d33f4ac9e114e584781b7c87
                            • Instruction ID: c6ec1e06e337034457c3d1db3d46831115e874e6a46b9bc6e897cbe113f52fcc
                            • Opcode Fuzzy Hash: fa74662142cd5858ff4d6864a187426225f9c372d33f4ac9e114e584781b7c87
                            • Instruction Fuzzy Hash: D641E271900129ABEF219F269C41F9F7BB9AF45311F00449BFC08E6252EA39DD58CB65
                            APIs
                            • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Info
                            • String ID: $fD$pH`=/
                            • API String ID: 1807457897-25039837
                            • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                            • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                            • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                            • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe,00000104), ref: 00442714
                            • _free.LIBCMT ref: 004427DF
                            • _free.LIBCMT ref: 004427E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$FileModuleName
                            • String ID: C:\Users\user\AppData\Roaming\LwGrjoPJzyBSZs.exe
                            • API String ID: 2506810119-142357708
                            • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                            • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                            • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                            • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                            APIs
                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,00000000,00000000,?,?,0044A885,?,00000000,00000000), ref: 0044A5D9
                            • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,0044A885,?,00000000,00000000,00000000,00000000,0000000C,00000000,0043B9C4,?), ref: 0044A607
                            • GetLastError.KERNEL32(?,0044A885,?,00000000,00000000,00000000,00000000,0000000C,00000000,0043B9C4,?,00475B70,?,?,00000000,?), ref: 0044A638
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharErrorFileLastMultiWideWrite
                            • String ID: pH`=/
                            • API String ID: 2456169464-3904821703
                            • Opcode ID: 17e9bdea2327856549b2d729a69f54a5a03eaa222f3bcd74165b36d2deefc3ff
                            • Instruction ID: dc7531123441a19c3ee305163ef761203b99fa3854004c878a1c9c286cd50013
                            • Opcode Fuzzy Hash: 17e9bdea2327856549b2d729a69f54a5a03eaa222f3bcd74165b36d2deefc3ff
                            • Instruction Fuzzy Hash: 53318171A00219AFDB14CF59DD819EAB7B8EF08315F0544BEE90AD7250DA34ED90CF69
                            APIs
                            • __alloca_probe_16.LIBCMT ref: 00451B89
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,00001004,00000000,00000000,?,00000080,00000000,00000000,?,00000080,00000000,00000000), ref: 00451BE6
                            • __freea.LIBCMT ref: 00451BEF
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide__alloca_probe_16__freea
                            • String ID: pH`=/
                            • API String ID: 3062693170-3904821703
                            • Opcode ID: 613b976a2355cf4f4ba5ba8ffc7bdff0db3c2b567fd9e0d752e7206116cd8565
                            • Instruction ID: cd1b4bee94903b533452e24c1937292037e85c1f197a8edfb9b0fd0890e2033c
                            • Opcode Fuzzy Hash: 613b976a2355cf4f4ba5ba8ffc7bdff0db3c2b567fd9e0d752e7206116cd8565
                            • Instruction Fuzzy Hash: BC313972A00116ABDB208FA5CC41EAF7BA5DF40310F04476AFC14DB292EB38DD84C794
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                              • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                              • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                              • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                            • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                            • String ID: /sort "Visit Time" /stext "$8>G
                            • API String ID: 368326130-2663660666
                            • Opcode ID: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                            • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                            • Opcode Fuzzy Hash: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                            • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                            APIs
                            • _free.LIBCMT ref: 004481DD
                            • _free.LIBCMT ref: 00448233
                              • Part of subcall function 0044800F: _free.LIBCMT ref: 00448067
                              • Part of subcall function 0044800F: GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                              • Part of subcall function 0044800F: WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                              • Part of subcall function 0044800F: WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                            • String ID: pH`=/
                            • API String ID: 314583886-3904821703
                            • Opcode ID: a321ea17a487838045db2ce858005c675a897f4104d35ab4fa77d22e9e1a69bf
                            • Instruction ID: 199b356aa642283adb8c254b31611cf5f7507bdd3411797779e7419f4dff9485
                            • Opcode Fuzzy Hash: a321ea17a487838045db2ce858005c675a897f4104d35ab4fa77d22e9e1a69bf
                            • Instruction Fuzzy Hash: 6C213B72800518A7EB31A7259C41DEFB778EB83364F1102EFF899B2181DF784D86859A
                            APIs
                            • CreateThread.KERNEL32(00000000,00000000,004099A9,004740F8,00000000,00000000), ref: 0040992A
                            • CreateThread.KERNEL32(00000000,00000000,00409993,004740F8,00000000,00000000), ref: 0040993A
                            • CreateThread.KERNEL32(00000000,00000000,004099B5,004740F8,00000000,00000000), ref: 00409946
                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread$LocalTimewsprintf
                            • String ID: Offline Keylogger Started
                            • API String ID: 465354869-4114347211
                            • Opcode ID: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                            • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                            • Opcode Fuzzy Hash: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                            • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                            APIs
                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            • CreateThread.KERNEL32(00000000,00000000,00409993,?,00000000,00000000), ref: 0040A691
                            • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 0040A69D
                            • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread$LocalTime$wsprintf
                            • String ID: Online Keylogger Started
                            • API String ID: 112202259-1258561607
                            • Opcode ID: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                            • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                            • Opcode Fuzzy Hash: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                            • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                            APIs
                            • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                            • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                            • __dosmaperr.LIBCMT ref: 0044AAFE
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseErrorHandleLast__dosmaperr
                            • String ID: `@
                            • API String ID: 2583163307-951712118
                            • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                            • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                            • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                            • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                            APIs
                            • GetLocalTime.KERNEL32(?), ref: 00404946
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                            • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                            Strings
                            • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Create$EventLocalThreadTime
                            • String ID: KeepAlive | Enabled | Timeout:
                            • API String ID: 2532271599-1507639952
                            • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                            • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                            • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                            • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                            • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                            • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEventHandleObjectSingleWait
                            • String ID: Connection Timeout
                            • API String ID: 2055531096-499159329
                            • Opcode ID: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                            • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                            • Opcode Fuzzy Hash: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                            • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                            APIs
                            • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041277F
                            • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004742E0,759237E0,?), ref: 004127AD
                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004742E0,759237E0,?,?,?,?,?,0040BE18,?,00000000), ref: 004127B8
                            Strings
                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041277D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                            • API String ID: 1818849710-1051519024
                            • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                            • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                            • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                            • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                              • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                              • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                            • String ID: bad locale name
                            • API String ID: 3628047217-1405518554
                            • Opcode ID: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                            • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                            • Opcode Fuzzy Hash: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                            • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                            APIs
                            • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                            • RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                            • RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: Control Panel\Desktop
                            • API String ID: 1818849710-27424756
                            • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                            • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                            • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                            • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                            APIs
                            • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocaleValid
                            • String ID: IsValidLocaleName$j=D$pH`=/
                            • API String ID: 1901932003-3377795360
                            • Opcode ID: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                            • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                            • Opcode Fuzzy Hash: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                            • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                            APIs
                            • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                            • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                            • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: TUF
                            • API String ID: 1818849710-3431404234
                            • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                            • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                            • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                            • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExecuteShell
                            • String ID: /C $cmd.exe$open
                            • API String ID: 587946157-3896048727
                            • Opcode ID: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                            • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                            • Opcode Fuzzy Hash: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                            • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                            APIs
                            • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                            • GetProcAddress.KERNEL32(00000000), ref: 00401441
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: GetCursorInfo$User32.dll
                            • API String ID: 1646373207-2714051624
                            • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                            • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                            • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                            • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                            APIs
                            • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                            • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetLastInputInfo$User32.dll
                            • API String ID: 2574300362-1519888992
                            • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                            • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                            • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                            • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                            APIs
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: __alldvrm$_strrchr
                            • String ID:
                            • API String ID: 1036877536-0
                            • Opcode ID: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                            • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                            • Opcode Fuzzy Hash: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                            • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                            • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                            • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                            • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                            • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                            • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                            • String ID:
                            • API String ID: 3360349984-0
                            • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                            • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                            • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                            • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                            APIs
                            Strings
                            • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                            • Cleared browsers logins and cookies., xrefs: 0040B8EF
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep
                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                            • API String ID: 3472027048-1236744412
                            • Opcode ID: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                            • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                            • Opcode Fuzzy Hash: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                            • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                            APIs
                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                            • Sleep.KERNEL32(00000BB8), ref: 004115C3
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQuerySleepValue
                            • String ID: @CG$exepath$BG
                            • API String ID: 4119054056-3221201242
                            • Opcode ID: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                            • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                            • Opcode Fuzzy Hash: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                            • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                            APIs
                              • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                              • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                              • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                            • Sleep.KERNEL32(000001F4), ref: 00409C95
                            • Sleep.KERNEL32(00000064), ref: 00409D1F
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$SleepText$ForegroundLength
                            • String ID: [ $ ]
                            • API String ID: 3309952895-93608704
                            • Opcode ID: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                            • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                            • Opcode Fuzzy Hash: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                            • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                            APIs
                            • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                            • WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                            • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateHandlePointerWrite
                            • String ID:
                            • API String ID: 3604237281-0
                            • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                            • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                            • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                            • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                            • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                            • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                            • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                            • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                            • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                            • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                            APIs
                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                              • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                              • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                            • _UnwindNestedFrames.LIBCMT ref: 00438124
                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                            • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                            • String ID:
                            • API String ID: 737400349-0
                            • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                            • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                            • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                            • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                            • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B647
                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B66C
                            • CloseHandle.KERNEL32(00000000,?,00000000,00403AF3,00465324), ref: 0041B67A
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateHandleReadSize
                            • String ID:
                            • API String ID: 3919263394-0
                            • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                            • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                            • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                            • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                            APIs
                            • GetSystemMetrics.USER32(0000004C), ref: 00418519
                            • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                            • GetSystemMetrics.USER32(0000004E), ref: 00418525
                            • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: MetricsSystem
                            • String ID:
                            • API String ID: 4116985748-0
                            • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                            • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                            • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                            • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                            APIs
                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandleOpenProcess
                            • String ID:
                            • API String ID: 39102293-0
                            • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                            • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                            • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                            • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorHandling__start
                            • String ID: pow
                            • API String ID: 3213639722-2276729525
                            • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                            • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                            • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                            • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                            APIs
                              • Part of subcall function 0044DA5C: GetOEMCP.KERNEL32(00000000,?,?,0044DCE5,?), ref: 0044DA87
                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044DD2A,?,00000000), ref: 0044DEFD
                            • GetCPInfo.KERNEL32(00000000,0044DD2A,?,?,?,0044DD2A,?,00000000), ref: 0044DF10
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CodeInfoPageValid
                            • String ID: pH`=/
                            • API String ID: 546120528-3904821703
                            • Opcode ID: 53f6a56cd97a0974a2183497a5087aed56a9e6d0f65aaaec85088475c598411f
                            • Instruction ID: df262af5b8aedb6acfa17e1c9bcd504f5ccc85cb1eacd95bde0bd7f7b44a6e87
                            • Opcode Fuzzy Hash: 53f6a56cd97a0974a2183497a5087aed56a9e6d0f65aaaec85088475c598411f
                            • Instruction Fuzzy Hash: C2513370D042059EFB348F72C8856BBBBA5AF41304F14446FD0978B252D67DA94ACB99
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CountEventTick
                            • String ID: >G
                            • API String ID: 180926312-1296849874
                            • Opcode ID: 8970c785a5fde0425d3bdd382a7839f198ae3ee3428ffa10454bc42c3a0da609
                            • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                            • Opcode Fuzzy Hash: 8970c785a5fde0425d3bdd382a7839f198ae3ee3428ffa10454bc42c3a0da609
                            • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: __alloca_probe_16__freea
                            • String ID: pH`=/
                            • API String ID: 1635606685-3904821703
                            • Opcode ID: eac9a9426b859d549b8c771f6175b2612c156b0394b9bd2443c31435fe95e641
                            • Instruction ID: eda24c5a96448ea724016aad991a3c17b1a8d64d08c979da106213b1ff49c618
                            • Opcode Fuzzy Hash: eac9a9426b859d549b8c771f6175b2612c156b0394b9bd2443c31435fe95e641
                            • Instruction Fuzzy Hash: C3410772600116ABFB24AF75CC41B6F77A4DF85764B24412BF808DB251EB7CD840D799
                            APIs
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004417D0
                            • ReadFile.KERNEL32(?,?,00001000,?,00000000), ref: 00441850
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileReadUnothrow_t@std@@@__ehfuncinfo$??2@
                            • String ID: pH`=/
                            • API String ID: 1834446548-3904821703
                            • Opcode ID: c96d12722c41e80bc005880b88915f851d74d10f7724423d8250eeb53ec0c138
                            • Instruction ID: 2146db567d2bb220d29859169affe98659c958252d9561a70165c400765bfcbb
                            • Opcode Fuzzy Hash: c96d12722c41e80bc005880b88915f851d74d10f7724423d8250eeb53ec0c138
                            • Instruction Fuzzy Hash: 7141E271B002599BFB20DF64CC80BE977B5EB48305F1081EAE54997261D779DEC1CB98
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: __cftof
                            • String ID: pH`=/$BG3i@
                            • API String ID: 1622813385-2618998928
                            • Opcode ID: 0e53b18c89b8a5a252250ce90d767f597698ce4f8bbb56296b0f5e4f7aee30ca
                            • Instruction ID: bce913b95f802116dab1e577d75f3ddb0db760047eed59d17a61653a1e464538
                            • Opcode Fuzzy Hash: 0e53b18c89b8a5a252250ce90d767f597698ce4f8bbb56296b0f5e4f7aee30ca
                            • Instruction Fuzzy Hash: 3D31B632424115EAB7246E399C8687FB768DE41734B24072FF824DA5D1EA2CDC43A35D
                            APIs
                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B39,?,00000050,?,?,?,?,?), ref: 004509B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: ACP$OCP
                            • API String ID: 0-711371036
                            • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                            • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                            • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                            • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                            APIs
                            • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,0044A875,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A4E2
                            • GetLastError.KERNEL32(?,0044A875,?,00000000,00000000,00000000,00000000,0000000C,00000000,0043B9C4,?,00475B70,?,?,00000000,?), ref: 0044A50B
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorFileLastWrite
                            • String ID: pH`=/
                            • API String ID: 442123175-3904821703
                            • Opcode ID: d59acdf6c95f355294a896f4b2b1403a1d02454dc51f2891e607a6df93cdfbc6
                            • Instruction ID: d2b0fdf121e4141f9d7aedeff3631e04d8df33b54a9a48bc31cf78ca303085e0
                            • Opcode Fuzzy Hash: d59acdf6c95f355294a896f4b2b1403a1d02454dc51f2891e607a6df93cdfbc6
                            • Instruction Fuzzy Hash: 28318D31A002199BCB24CF69DD809DAF3F9EF88315F1084BAE909D7260D634ED91CB59
                            APIs
                            • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,0044A895,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A3F4
                            • GetLastError.KERNEL32(?,0044A895,?,00000000,00000000,00000000,00000000,0000000C,00000000,0043B9C4,?,00475B70,?,?,00000000,?), ref: 0044A41D
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorFileLastWrite
                            • String ID: pH`=/
                            • API String ID: 442123175-3904821703
                            • Opcode ID: f4908108f976f30314336d421f36b30058cab31412de2b9c2098902a93001b52
                            • Instruction ID: e9c05e2c57ce44ee84f0e33fe03ef9ce333ea83921497ff6c8cd7e19a143d9c9
                            • Opcode Fuzzy Hash: f4908108f976f30314336d421f36b30058cab31412de2b9c2098902a93001b52
                            • Instruction Fuzzy Hash: 6021E131A002189FCB14CF59D984AE9B3F9EB48306F1004AEE90AD7211D774AE85CF29
                            APIs
                            • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                            Strings
                            • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime
                            • String ID: KeepAlive | Enabled | Timeout:
                            • API String ID: 481472006-1507639952
                            • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                            • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                            • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                            • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                            APIs
                            • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime
                            • String ID: | $%02i:%02i:%02i:%03i
                            • API String ID: 481472006-2430845779
                            • Opcode ID: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                            • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                            • Opcode Fuzzy Hash: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                            • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043419B
                            • ___raise_securityfailure.LIBCMT ref: 00434282
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FeaturePresentProcessor___raise_securityfailure
                            • String ID: pH`=/
                            • API String ID: 3761405300-3904821703
                            • Opcode ID: 55f35760b53b456a169b3277dece2ce7442f289f493762303a99d350d49c20e8
                            • Instruction ID: 152c00956f4b34dade641c512d66f5ecdeb636344f370a0960c3468f4f65043c
                            • Opcode Fuzzy Hash: 55f35760b53b456a169b3277dece2ce7442f289f493762303a99d350d49c20e8
                            • Instruction Fuzzy Hash: 2C21BCB5512300DAE760CF69F946B543BA8BB58314F10683AE90CCA3A1E3F4A9C1CB4D
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: alarm.wav$xIG
                            • API String ID: 1174141254-4080756945
                            • Opcode ID: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                            • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                            • Opcode Fuzzy Hash: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                            • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                            APIs
                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                            • CloseHandle.KERNEL32(?), ref: 0040A7CA
                            • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                            • String ID: Online Keylogger Stopped
                            • API String ID: 1623830855-1496645233
                            • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                            • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                            • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                            • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                            APIs
                            • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 004478CE
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: String
                            • String ID: LCMapStringEx$pH`=/
                            • API String ID: 2568140703-3237426285
                            • Opcode ID: 68bfb2a0323cd8b45511a9baf355383e686fac269e028269e4b923a5fcfd5390
                            • Instruction ID: 749e071dddadb0611b3357a2cf1c840dd35b3db394ad94bf3c266594d1e105ea
                            • Opcode Fuzzy Hash: 68bfb2a0323cd8b45511a9baf355383e686fac269e028269e4b923a5fcfd5390
                            • Instruction Fuzzy Hash: D4012932504209FBDF12AF90DC06EEE7F62EF09755F008165FE0865161C7369971EB99
                            APIs
                            • GetDateFormatW.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,004466D0,?,00000000,00401AD8), ref: 00447580
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: DateFormat
                            • String ID: GetDateFormatEx$pH`=/
                            • API String ID: 2793631785-710544633
                            • Opcode ID: d62e718867faf438bf86df2b1a1f98fc255ebd42f653d41745076d328fd95ae1
                            • Instruction ID: 107bc5199d8ee9bd941501caefe4e3e09b7036c662d67d2c93170c31f93f932a
                            • Opcode Fuzzy Hash: d62e718867faf438bf86df2b1a1f98fc255ebd42f653d41745076d328fd95ae1
                            • Instruction Fuzzy Hash: 4C015E3254420DFBDF129F90DC06E9E3F62EF08751F004455FD0456161C73A8931EB99
                            APIs
                            • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                            • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: wave$BufferHeaderPrepare
                            • String ID: T=G
                            • API String ID: 2315374483-379896819
                            • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                            • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                            • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                            • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                            APIs
                            • GetTimeFormatW.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,004466D0,?,00000000,00401AD8), ref: 004476B0
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: FormatTime
                            • String ID: GetTimeFormatEx$pH`=/
                            • API String ID: 3606616251-3652529983
                            • Opcode ID: 5ad3e4583dadef9c7fb93e34cbd6412838cf64860adf33c24f1c20439ee08611
                            • Instruction ID: 3fcb3ff1dd883ddaf863bb7c07e380bbf4f181685cad0432e832d9f8a01a98f1
                            • Opcode Fuzzy Hash: 5ad3e4583dadef9c7fb93e34cbd6412838cf64860adf33c24f1c20439ee08611
                            • Instruction Fuzzy Hash: 07F0C831A0420CFBEF11AF65DC06EAE7F25EF04715F00006AFC0466262CB358921ABDD
                            APIs
                            • GetUserDefaultLCID.KERNEL32(00000055,?,00000000,004503AF,?,00000055,00000050), ref: 00447711
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: DefaultUser
                            • String ID: GetUserDefaultLocaleName$pH`=/
                            • API String ID: 3358694519-2530848923
                            • Opcode ID: 3672e5463deaf5ea45bb47fb4b4115e18536fd74a669daa61855c36d412e2cd6
                            • Instruction ID: c4de6933aa7e9282c2d26db3fc0b7b8b7f29f17085e7c1fb0c181cc3595b3be3
                            • Opcode Fuzzy Hash: 3672e5463deaf5ea45bb47fb4b4115e18536fd74a669daa61855c36d412e2cd6
                            • Instruction Fuzzy Hash: 0CF02430A04208B7DB11AF61DC02E9E7F64EF04711F404066FC045A272CB799E119BCD
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: H_prolog
                            • String ID: T=G$T=G
                            • API String ID: 3519838083-3732185208
                            • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                            • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                            • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                            • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                            APIs
                            • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044AC56,-00000020,00000FA0,00000000,00466608,00466608,00000000), ref: 00447779
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: CountCriticalInitializeSectionSpin
                            • String ID: InitializeCriticalSectionEx$pH`=/
                            • API String ID: 2593887523-498810553
                            • Opcode ID: ba2e66625b1e639b92ffbfc2d6060421e95bbac502ea62ad06ade3e8b7a0989c
                            • Instruction ID: f6b50553e1d3dd0462d8356f048064d45bc8ee5fbdc9d8762f4c05423acd684c
                            • Opcode Fuzzy Hash: ba2e66625b1e639b92ffbfc2d6060421e95bbac502ea62ad06ade3e8b7a0989c
                            • Instruction Fuzzy Hash: A0F0B431A4420DFBCB155F65EC05E9E7F61DF04722B0040BAFC0856261CB39AE11D69D
                            APIs
                            • GetKeyState.USER32(00000011), ref: 0040AD5B
                              • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                              • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                              • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                              • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                              • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                              • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                              • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                            • String ID: [AltL]$[AltR]
                            • API String ID: 2738857842-2658077756
                            • Opcode ID: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                            • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                            • Opcode Fuzzy Hash: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                            • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Alloc
                            • String ID: FlsAlloc$pH`=/
                            • API String ID: 2773662609-3357747413
                            • Opcode ID: e78667822f5e79ab7c14d9e4ecf03f3a03c6c70fe98cf5666842121660a76376
                            • Instruction ID: 24f66c7253cb77c9f437760898e342ee7dcb6335a46030aa2dd544025cc123c2
                            • Opcode Fuzzy Hash: e78667822f5e79ab7c14d9e4ecf03f3a03c6c70fe98cf5666842121660a76376
                            • Instruction Fuzzy Hash: B8E05530A8420AA7D214AF20AC03A2EFB54CF04762F0005AAFC0493342CE388E01D1DE
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Free
                            • String ID: FlsFree$pH`=/
                            • API String ID: 3978063606-3864077660
                            • Opcode ID: eb267d74104736367ab5431944ac8927a785c50e3789802343b1094df18b8064
                            • Instruction ID: 7735eda0010a26759507aa5f10490f8ec8c905a22dac2ca951c33145abc56605
                            • Opcode Fuzzy Hash: eb267d74104736367ab5431944ac8927a785c50e3789802343b1094df18b8064
                            • Instruction Fuzzy Hash: D1E0E531A45218A7D720AF25AC02E3EBF94DF44B12F1001AAFD0597252CE355E0196DE
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(00000000,004395D7), ref: 00447640
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: Time$FileSystem
                            • String ID: GetSystemTimePreciseAsFileTime$pH`=/
                            • API String ID: 2086374402-1357327521
                            • Opcode ID: aedcab76af92cc4bc62ea73aa4e5c5ea7e51aa4d01cdec665397a9b648c5c9e1
                            • Instruction ID: 93e267b14f3539efa22cf49968ab422456f43bf7ede497bc1fb1296ec8be01e3
                            • Opcode Fuzzy Hash: aedcab76af92cc4bc62ea73aa4e5c5ea7e51aa4d01cdec665397a9b648c5c9e1
                            • Instruction Fuzzy Hash: 2EE0E531A46218A79320AF25AC03E3FBB54DF04B22F1102BAFC0597253CE254D019ADE
                            APIs
                            • _free.LIBCMT ref: 00448825
                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorFreeHeapLast_free
                            • String ID: `@$`@
                            • API String ID: 1353095263-20545824
                            • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                            • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                            • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                            • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                            APIs
                            • GetKeyState.USER32(00000012), ref: 0040ADB5
                            Strings
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: State
                            • String ID: [CtrlL]$[CtrlR]
                            • API String ID: 1649606143-2446555240
                            • Opcode ID: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                            • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                            • Opcode Fuzzy Hash: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                            • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                            APIs
                            • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040C33C,00000000,?,00000000), ref: 00412988
                            • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00412998
                            Strings
                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteOpenValue
                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                            • API String ID: 2654517830-1051519024
                            • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                            • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                            • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                            • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                            • GetLastError.KERNEL32 ref: 0043FB02
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                            Memory Dump Source
                            • Source File: 00000010.00000002.2262362022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_16_2_400000_LwGrjoPJzyBSZs.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast
                            • String ID:
                            • API String ID: 1717984340-0
                            • Opcode ID: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                            • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                            • Opcode Fuzzy Hash: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                            • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759